Protecting Mobile Data Privacy in the Enterprise
The workplace today is dominated by mobile devices. Employee interaction via smartphone or tablet has become second nature. They will very likely use them to check work emails, download files...
The risk of attack is getting closer – mobile devices in focus
Smartphones are part of everyday life, either for private or professional use. However, while many users have taken basic measures to protect their desktop PC or laptop, this is not the case for...
When Remote Access Becomes Your Enemy
As convenient as it would be for businesses to have all their IT service providers working on-site, just down the hall, that’s not always possible. That’s why secure remote access is a component...
IPv6: Looking Back on Year One
It was only one year ago that the world welcomed the launch of IPv6, the long-anticipated solution to the problem of the world running out of IP addresses.
Expert Q&A: Preventing Mobile Hacking: Must You Take Precautions?
*Editor’s Note: This column originally appeared in TechTarget’s SearchNetworking.com
VPNs Enable Desktop Virtualization
By Bernd Reder
Webinar: What CIOs and CTOs Need to Know About Mobile Device Security
Rainer Enders, CTO, Americas at NCP engineering, recently conducted an Execsense webinar around what CIOs and CTOs need to know about mobile device security. Rainer explains how the replacement of...
Forward Thinking: Network Security Predictions for 2013
The proliferation of social networking and the acceleration of personal devices for corporate use can be a boon for remote workers. Unfortunately, this increase in systems and cross-platform networks...
How Can I Ensure App Store Security for my Remote Users?
*Editor’s Note: This column originally appeared in TechTarget’s SearchEnterpriseWAN.com.
What We're Reading, Week of 11/19
Dark Reading – Half Of Machines Shopping On Cyber Monday Likely Contain VulnerabilitiesMidsize Insider – IT Security Threats: The Predictive Problem SearchCloudApplications – Mobile cloud trends:...