December 2012

Readers' Poll: What Solutions Should Lead the Charge for Enhanced Network Security in 2013?
2012 has been quite the year for the mobile security industry. We've seen bring your own device (BYOD) come to the forefront of discussions, both in terms of its benefits and threats to network...

Readers' Poll: What Solutions Should Lead the Charge for Enhanced Network Security in 2013?
2012 has been quite the year for the mobile security industry. We've seen bring your own device (BYOD) come to the forefront of discussions, both in terms of its benefits and threats to network...

Forward Thinking: Network Security Predictions for 2013
The proliferation of social networking and the acceleration of personal devices for corporate use can be a boon for remote workers. Unfortunately, this increase in systems and cross-platform networks...

What We're Reading: Week of 12/17
CNET – Four security trends defined 2012, will impact 2013

What We're Reading: Week of 12/17
CNET – Four security trends defined 2012, will impact 2013

How Can I Ensure App Store Security for my Remote Users?
*Editor’s Note: This column originally appeared in TechTarget’s SearchEnterpriseWAN.com.

What are the Biggest Risks of BYOD?
*Editor’s Note: This column originally appeared in TechTarget’s SearchEnterpriseWAN.com.

Readers' Poll: What is Your Preferred Method of Enabling Two-Factor Authentication?
NCP engineering announced this week that its Secure Enterprise Management 3.0 would enable powerful Two-Factor Authentication with a One-Time Password that users receive via SMS. This made us wonder,...

Readers' Poll: What is Your Preferred Method of Enabling Two-Factor Authentication?
NCP engineering announced this week that its Secure Enterprise Management 3.0 would enable powerful Two-Factor Authentication with a One-Time Password that users receive via SMS. This made us wonder,...

Why VPNs Matter for Governments, Part 2
Editor's Note: Part one of this two-part series ran last week.