Kaspersky makes very good endpoint security software, one of just four companies to make both our top endpoint detection and response (EDR) and best antivirus software product lists.
But the Moscow-b...
Mobile communications are an increasingly integral part of their everyday lives for people at work and at play. But as mobile access has grown, so have mobile s...
As users have increasingly moved from desktop operating systems to mobile devices as their primary form of computing, cyber attackers have taken notice and malware has follo...
The era of employees bringing their own devices into corporate environments created the need for advanced technology platforms to help control all types of devices. Bring Your Own Device, often shorte...
A core element of computing access is end users and their devices. It is the device that will access a network or corporate application and it is often the device that represents the "last mile" of se...
The modern enterprise is mobile and employees are no longer tethered to their corporate owned and provisioned computing equipment. As is the case in the wired world, mobile ...
What is a CASB?
A CASB provides enterprises with a critical control point for the secure use of cloud services across multiple cloud providers. Software as a service (SaaS) apps are becomi...
Check Point researchers recently found mobile ransomware embedded in an app called EnergyRescue, which was available from the official Google Play store.The malware, called Charger, steals contact i...
"My role as chief data officer is to oversee four things ... that I think are critically important," said Nick Marko as he moderated a panel discussion on the evolving role o...
By Aleksey Gavrilenko, ItransitionApproaches to security issues change constantly, along with evolving threats. One approach is to implement OAuth, an open authorization st...