Mobile

Best Wi-Fi Security & Performance Testing Tools for 2022

The prevalence of Wi-Fi has been accelerating for two decades, but in the last two years, it's surged even further as so many people were forced to work from home. That trend led to many strengthening...

SAML: Still Going Strong After Two Decades

SAML is an open standard facilitating the communication and verification of credentials between identity providers and service providers for users everywhere. In 2005, the open standard consortium...

Best Enterprise Mobility Management (EMM) Solutions for 2022

Managing mobile apps and devices is a challenge faced by all organizations these days. One technology that’s evolved to address mobile security, access management, and control is enterprise mobility m...

Best Identity and Access Management (IAM) Solutions for 2022

A lot has changed in the two years since we last examined the identity and access management (IAM) market. Some vendors have disappeared. New ones have emerged. The once-great security giant Symantec ...

Top IoT Security Solutions for 2022

IoT security is where endpoint detection and response (EDR) and enterprise mobility management (EMM) meet the challenges of a rapidly expanding edge computing infrastructure. As the enterprise attack...

The Best Wi-Fi 6 Routers Secure and Fast Enough for Business

Remote work and home offices were an afterthought until the COVID-19 pandemic. They were then vaulted to the forefront of security concerns so quickly that security and IT teams were caught off guard....

Secure Access for Remote Workers: RDP, VPN & VDI

A fundamental cornerstone of security is layers. We use passwords to authenticate our users, run antivirus to keep malware off our endpoints, monitor our networks, and implement firewalls so we can ha...

EU to Force IoT, Wireless Device Makers to Improve Security

The European Union is poised to place more demands on manufacturers to design greater security into their wireless and Internet of Things (IoT) devices. In an amendment to the EU’s 2014 Radio Equip...

Multi-Factor Authentication (MFA) Best Practices & Solutions

This post has been updated for 2021. Passwords are the most common authentication tool used by enterprises, yet they are notoriously insecure and easily hackable. But even when passwords are secure...

Cybersecurity Risks of 5G – And How to Control Them

5G is on the cusp of widespread adoption. Consumers and organizations are enthused about the operational benefits of more robust mobile connectivity, but the shift to 5G networks doesn't come with...

Latest articles