Cybercriminals use many different types of malware to attack systems. Here are some of the most common malware types and how to defend against them. We define everything from adware to worms and everything in between.
The OS is in use on a wide range of devices, including Galaxy Gear smartwatches and Z1, Z2 and Z3 phones.
More companies are moving sensitive data to the cloud, increasing the need to secure that data. One popular approach is called a cloud access security broker, or CASB. Find out more about CASB technology and products here.
Network access control lets IT departments determine which users and devices have authorized permissions, adding another level of security to the network and its data.
The allegedly compromised account information may have come from the LinkedIn breach.
The drive to digital transformation encourages use of low-code application development platforms, but these tools often overlook security, leaving enterprises exposed to unknown threats. TrackVia injects security back into the application development equation using a low-code platform that speeds development yet institutes protection.
Multi-factor authentication provides a more secure option than passwords and ID alone. We take a comprehensive look at MFA security, two-factor authentication, mobile authentication, biometrics and vendors, and issues to consider before adopting an MFA solution.
Last year saw a volume of mobile malware equivalent to half of all the malware detected over the previous 11 years, according to a recent report.
A new integration allows Microsoft Enterprise Mobility + Security customers to protect their mobile devices against sophisticated threats.
NetMotion Mobility combines provisioning, governance and security into a package any network admin could love.
One in four said something embarrassing has popped up on their phone while someone else was holding it, a recent survey found.
And 42 percent access corporate data over public Wi-Fi, a recent survey found.
The proof-of-concept worm could jump from one smart bulb to another via ZigBee wireless connectivity.
OAuth 2.0 can be an effective authorization method. Here we offer tips on implementing and using an OAuth 2.0 authorization server using the OWIN framework.
And smartphones accounted for 78 percent of those infections, according to Nokia.
The rise of citizen developers creates more mobile security concerns. What can enterprises do to ensure mobile apps are secure?