Mobile

Google Patches Android for 49 Vulnerabilities in August Update

Google released its August Android Security update on August 7, patching no less than 49 different vulnerabilities in the mobile operating system.Android's...

Google Patches Android and Chrome for Security Vulnerabilities

Google's security teams are keeping busy this week, updating the Android mobile operating system and Chrome browser for Windows, macOS and Linux.AndroidOnce...

Types of Mobile Malware & Solutions

As users have increasingly moved from desktop operating systems to mobile devices as...

Google Patches 17 Critical Vulnerabilities in Android May Security Update

Google is pushing out its May patch update for Android devices this week, with the much...

64 Percent of Security Pros Can’t Stop a Mobile Data Breach

Sixty-four percent of security professionals doubt their organizations can prevent a breach to employees' mobile devices, a recent Dimensional Research survey ...

What is Mobile Device Management (MDM)?

The era of employees bringing their own devices into corporate environments created the need for advanced technology platforms to help control all types of...

Ultimate Guide to BYOD Security

A core element of computing access is end users and their devices. It is the device that will access a network or corporate application...

Enterprise Mobility Management Guide

The modern enterprise is mobile and employees are no longer tethered to their...

Major Security Flaws Uncovered in Samsung’s Tizen Operating System

Equus Software security researcher Amihai Neiderman recently uncovered several major security flaws in Samsung's Linux-based Tizen operating system, which the company uses...

Cloud Access Security Broker (CASB) Solution

  What is a CASB? A CASB provides enterprises with a critical control point for the secure use of cloud services across multiple cloud providers. Software...

Latest articles

The IoT Cybersecurity Act of 2020: Implications for Devices

A universe of devices and technology has fallen into our laps at a speed that organizations struggle to manage effectively. And that boom in...

Top 10 Governance, Risk and Compliance (GRC) Vendors

Governance, risk, and compliance (GRC) software helps businesses manage all of the necessary documentation and processes for ensuring maximum productivity and preparedness. Data privacy...

Best Intrusion Detection and Prevention Systems: Guide to IDPS

Intrusion Detection and Prevention Systems (IDPS) operate by monitoring network traffic, analyzing it and providing remediation tactics when malicious behavior is detected. They look...

Automating Security Risk Assessments for Better Protection

Protecting your organization from IT security risks is an ongoing, fluid task. Proactively identifying, mitigating and remediating security threats is one of the biggest...