Mobile Security - Article Archives - Page 38

Paranoid or Just Securing Your Data?

May 31, 2005 |
eSecurityPlanet columnist Ken van Wyk says friends and family tell him he's paranoid. But who has the secure network?
READ MORE

WLAN Security Spec Goes Open Source

May 05, 2005 |
Atheros says its JumpStart technology would benefit the industry if it were more readily available.
READ MORE

Updating our Thinking on Software Updates

May 03, 2005 |
eSecurityPlanet columnist Ken van Wyk looks at the issue of software updates -- particularly the lack there of for mobile devices.
READ MORE

Cisco Fixes a Pair of IOS Vulnerabilities

April 07, 2005 |
Cisco has released patches that address denial of service and authentication vulnerabilities in IOS.
READ MORE

Handheld Security Too Expensive For Enterprise?

April 04, 2005 |
Companies need to assess their antivirus, VPN, device security and management software, the Burton Group found.
READ MORE

Network Security Top Priority in 2005

February 25, 2005 |
Facing an ever-growing array of threats to corporate information systems, technology executives now see enhancing network security as 'Job One'.
READ MORE

Hilton's T-Mobile Hack a Password Wake-Up

February 22, 2005 |
Along with phone numbers of celebrities in the socialite's Sidekick, the hacking incident exposes the need for strong passwords.
READ MORE

Managing Digital Risk with Cyber Insurance

February 16, 2005 |
Since there's no way to eliminate security risks, a panel of industry players at the RSA Conference say insuring against cyber attacks or network downtime is increasing in popularity.
READ MORE

A Lost PDA puts Your Data in Danger

February 07, 2005 |
Columnist Linda LeBlanc has a confession to make. She's a danger to any PDA she owns. She loses them, sits on them... even drops them in the sewer. What kind of danger is her data -- and her schedule -- in?
READ MORE

A Firewall for Your Mobile Employees

January 19, 2005 |
If any of your employees rely on notebooks to work off site, you might consider a mobile firewall to protect company data.
READ MORE

Protecting the Enterprise from Users' New, Cool Tools

January 03, 2005 |
As employees head back to the office, many of them will be coming in with new, cool gadgets in hand -- straight from Santa's sack. Could these new smart phones, PDAs and MP3 players be a security risk? Yes, they can, and here's what to do about it.
READ MORE

With Wireless, Who Can You Trust? No One

December 06, 2004 |
Datamation's new columnist, Linda LeBlanc, looks at how safe your information is when you use a wireless access point from a friend's house or coffee shop. You'd never guess who could be snooping.
READ MORE

Self-Managing and Personal Defenses

November 09, 2004 |
AirDefense says its latest upgrade makes things easier and safer at the enterprise, and it's offering a Windows module for mobile users to help in the fight for security.
READ MORE

Securing the DoJ

November 09, 2004 |
Senforce scores a big deal: a contract with the Department of Justice that will put its network security product on thousands of wireless and wired government PCs.
READ MORE

Who's in Charge of this Network?

November 08, 2004 |
You think you're keeping all of the bad guys out with your fancy perimeter defenses? Think again. The biggest dangers may already be lurking inside.
READ MORE

WLANs: Get Cracking ... Before Your Users Do

November 08, 2004 |
Your users want a WLAN, the executive suite probably wants a WLAN, and maybe even you want a WLAN, so what's the holdup? A recent report says wireless security concerns are probably just as overstated as the boost in productivity the folks down in marketing claim they'll get from working on park benches.
READ MORE

The Incredible Hidden Wireless Connection

November 04, 2004 |
No matter how much security an administrator puts into his network, all it takes is one hidden access point innocently set up by an employee to blow a gaping hole in the enterprise, leaving the company wide open to attack.
READ MORE

WiFi Security Concerns Easing

November 03, 2004 |
For corporate deployment of WiFi networks, security has been the biggest hurdle to overcome and one of WiFi's biggest cons. Today, all that has changed.
READ MORE

Giving Network Demons the Boot

October 22, 2004 |
Can corporate IT administrators learn a lesson from two colleges that stopped virus attacks in their tracks?
READ MORE

CREDANT, Cranite Partner to Create Certified Security for Extended WLANs

October 19, 2004 |
Combining expertise in enterprise WLAN security and protection for mobile wireless computing devices, the alliance also complies with existing governmental standards for security and privacy.
READ MORE