Despite the risks of not making security policies central to enterprise BYOD and mobility programs, many organizations are ignoring this best practice.
Hackers collectively known as Anonymous plan to participate in a protest called the Million Mask March. Do organizations need to revisit their security strategies?
The annual Building Security in Maturity Model (BSIMM) study adds new software security data every year. Nearly 70 companies contributed to version five, introduced this week.
Want employees to pay attention to security awareness training? Make it accessible, pervasive and targeted to your audience.
Despite security concerns, a surprisingly small number of companies blacklist or whitelist applications on mobile devices.
Some mobile Android apps from Fortune 500 companies do not adhere to security best practices, finds a recent analysis by IT consulting firm RIIS.
Just as lions look for gazelles with their defenses down at waterholes, hackers are spreading malware through websites popular with specific groups of users.
Perhaps the biggest mobile device management (MDM) trend to watch is its evolution to a more holistic approach some experts call enterprise mobility management.
Malware that uses a pop-up window to hijack a user's machine and asks them to take a survey could lead to more serious demands, says Malwarebytes' lead analyst.
Thanks to the BYOD phenomenon, Gartner expects 65 percent of enterprises to adopt a mobile device management (MDM) solution over the next five years.
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?