Mobile

Apple Attributes Alleged iCloud Hack to Password Reuse

A hacker group identifying itself as the "Turkish Crime Family" is threatening to reset millions of iCloud accounts and wipe iPhones unless...

TrackVia Combines Low-Code Apps with Security Best Practices

In many cases, IT security has become a victim to digital transformations — a situation that has led to breaches and data...

Multi-Factor Authentication Best Practices & Solutions

Passwords are the most common authentication tool used by enterprises, yet passwords are...

Skycure Brings Mobile Threat Intelligence to Microsoft EMS

Customers of Microsoft's Enterprise Mobility + Security (EMS) mobile device management platform...

NetMotion Leverages Software-Defined Trend to Secure Mobile Devices

Enterprise mobility is taking the business world by storm. It is poised to tear down the barriers that keep productivity at bay,...

Ransomware App Found in Google Play Store

Check Point researchers recently found mobile ransomware embedded in an app called EnergyRescue, which was available from the official Google Play store.The...

3 Ways CISOs Can Partner with Chief Data Officers

"My role as chief data officer is to oversee four things ... that I...

5 Tips on Using OAuth 2.0 for Secure Authorization

By Aleksey Gavrilenko, ItransitionApproaches to security issues change constantly, along with evolving...

What Citizen Developers Should Know About Mobile Security

By Aaron Bryson, KonyDedicated, full-time developers know that, as with all forms of software development, security should be a top priority when...

94 Percent of IT Pros See Free Wi-Fi Hotspots as a Significant Security Threat

A recent survey of 500 CIOs and IT decision makers in the U.S., U.K., Germany and France found that fully 94 percent...

Latest articles

The IoT Cybersecurity Act of 2020: Implications for Devices

A universe of devices and technology has fallen into our laps at a speed that organizations struggle to manage effectively. And that boom in...

Top 10 Governance, Risk and Compliance (GRC) Vendors

Governance, risk, and compliance (GRC) software helps businesses manage all of the necessary documentation and processes for ensuring maximum productivity and preparedness. Data privacy...

Best Intrusion Detection and Prevention Systems: Guide to IDPS

Intrusion Detection and Prevention Systems (IDPS) operate by monitoring network traffic, analyzing it and providing remediation tactics when malicious behavior is detected. They look...

Automating Security Risk Assessments for Better Protection

Protecting your organization from IT security risks is an ongoing, fluid task. Proactively identifying, mitigating and remediating security threats is one of the biggest...