Archive for December, 2012

2012 has been quite the year for the mobile security industry. We’ve seen bring your own device (BYOD) come to the forefront of discussions, both in terms of its benefits and threats to network security. We’ve seen multiple strands of different trojans and malware that cost companies hundreds of thousands of dollars. Microsoft released Windows [...]

2012 has been quite the year for the mobile security industry. We’ve seen bring your own device (BYOD) come to the forefront of discussions, both in terms of its benefits and threats to network security. We’ve seen multiple strands of different trojans and malware that cost companies hundreds of thousands of dollars. Microsoft released Windows [...]

The proliferation of social networking and the acceleration of personal devices for corporate use can be a boon for remote workers. Unfortunately, this increase in systems and cross-platform networks can also be a huge opportunity for cybercriminals looking to launch targeted attacks. In 2012, the sophistication of mobile malware intensified, damaging individuals, businesses and governments [...]

CNET – Four security trends defined 2012, will impact 2013 eWeek – BYOD, Social Media Among Top Security Threats of 2013 CSO – The week in security: Attacks continue; are you ready for 2013? IT Business Edge – How to Approach Mobile Security in 2013 Share this:EmailFacebookPrint

CNET – Four security trends defined 2012, will impact 2013 eWeek – BYOD, Social Media Among Top Security Threats of 2013 CSO – The week in security: Attacks continue; are you ready for 2013? IT Business Edge – How to Approach Mobile Security in 2013 Share this:EmailFacebookPrint