Read more about mobile devices
Bookmark and Share
  • Organizations lack control over mobile workspaces

    14.05.2015

    More than 64 percent of respondents to a SANS survey said a majority of their mobile workforce can access their organizationsí secure data remotely, yet less than 25 percent said sufficient policies/controls are in place for mobile media.

  • Total data protection outside the firewall

    13.05.2015

    Gartner called Cloud Access Security Brokers (CASBs) the number one technology for information security in 2014.

  • IoT and the great data heist

    11.05.2015

    The term mobile has evolved from the device that simply made and received phone calls, to smartphones, wearables and a multitude of devices in the home.

  • The risks of moving data into cloud and mobile environments

    05.05.2015

    In this podcast recorded at RSA Conference 2015, Rich Campagna, VP, Products & Marketing at Bitglass, talks about how cloud and mobile and the the largest trends happening in enterprise IT today.

  • Yahoo develops cheap, effective biometric smartphone authentication

    30.04.2015

    A group of Yahoo researchers have demonstrated that apart from fingerprints, other parts of the human body, such as ears, fists, palms and fingers, can also be successfully used to authenticate users to their mobile phones.




Spotlight

Check out the Windows 10 security features

The release of Windows 10 brings a number of security upgrades that look good on paper, but as with all new products to market, it is advisable that organisations carefully plan any upgrades.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Thu, Jul 30th
    COPYRIGHT 1998-2015 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //