Mobile

Multi-Factor Authentication Best Practices & Solutions

This post has been updated for 2021. Passwords are the most common authentication tool used by enterprises, yet they are notoriously insecure and easily hackable....

Cybersecurity Risks of 5G – And How to Control Them

5G is on the cusp of widespread adoption. Consumers and organizations are enthused about the operational benefits of more robust mobile connectivity, but the shift...

Mobile Malware: Threats and Solutions

As users have increasingly moved from desktop operating systems to mobile devices as their primary form of computing, cyber attackers have taken notice and...

Apple Security Under Scrutiny Amid Fallout from NSO Spyware Scandal

Reports that the NSO Group’s Pegasus spyware was used by governments to spy on Apple iPhones used by journalists, activists, government officials and business...

OAuth: Your Guide to Industry Authorization

Nearly a decade ago, the cyber industry was toiling over how to enable access for users between applications and grant access to specific information...

Best Kaspersky Alternatives

Kaspersky makes very good endpoint security software, one of just four companies to make both our top endpoint detection and response (EDR) and best...

Mobile & Smartphone Security Threats for 2021

  Mobile communications are an increasingly integral part of their everyday lives for people at work and at play. But as mobile access has grown,...

Free WiFI Security Testing Tools for 2021

  Good news: All Wi-Fi CERTIFIED products support WPA2 (AES-CCMP) security. The bad news, however, is that they do not guarantee they can harden a...

Best Enterprise Mobility Management (EMM) Solutions for 2021

Managing mobile apps and devices is a challenge faced by all organizations these days. One technology that's evolved to address mobile security, access and...

Best Identity and Access Management (IAM) Solutions for 2021

The identity and access management (IAM) market is going through significant changes, as behavior analytics and zero trust become an increasingly important part of...

Latest articles