Mobile

Enterprise Mobility Management Guide

The modern enterprise is mobile and employees are no longer tethered to their...

Major Security Flaws Uncovered in Samsung’s Tizen Operating System

Equus Software security researcher Amihai Neiderman recently uncovered several major security flaws in Samsung's Linux-based Tizen operating system, which the company uses...

Cloud Access Security Broker (CASB) Solution

  What is a CASB? A CASB provides enterprises with a critical control point for the secure use of cloud services across multiple cloud providers. Software...

Apple Attributes Alleged iCloud Hack to Password Reuse

A hacker group identifying itself as the "Turkish Crime Family" is threatening to reset millions of iCloud accounts and wipe iPhones unless...

TrackVia Combines Low-Code Apps with Security Best Practices

In many cases, IT security has become a victim to digital transformations — a situation that has led to breaches and data...

Multi-Factor Authentication Best Practices & Solutions

Passwords are the most common authentication tool used by enterprises, yet passwords are...

Skycure Brings Mobile Threat Intelligence to Microsoft EMS

Customers of Microsoft's Enterprise Mobility + Security (EMS) mobile device management platform...

NetMotion Leverages Software-Defined Trend to Secure Mobile Devices

Enterprise mobility is taking the business world by storm. It is poised to tear down the barriers that keep productivity at bay,...

Ransomware App Found in Google Play Store

Check Point researchers recently found mobile ransomware embedded in an app called EnergyRescue, which was available from the official Google Play store.The...

3 Ways CISOs Can Partner with Chief Data Officers

"My role as chief data officer is to oversee four things ... that I...

Latest articles

Database Security Best Practices

One reality of managing large organizations involves collecting massive amounts of sensitive data that is stored and managed in databases. This makes databases a...

ESET Product Review

Antivirus solutions have long been a staple of cybersecurity practices. However, antivirus is no longer enough to protect an entire organization's infrastructure.  Some antivirus solutions...

Kasada Product Review

Kasada is an automated bot detection and mitigation solution designed for enterprise web applications. Its aim is to stop bots from crashing websites, automating...

Crowdstrike Firewall Management Product Review

Crowdstrike's Firewall Management platform is a host firewall tool that centralizes defense against malware threats. It's a module within the broader Falcon endpoint protection...