Posts tagged with malware

Industry Commentary · Mobile · VPN

Mobile Malware and the Corporate Network

Cybersecurity threats are constantly evolving, and for IT teams looking to patch the latest vulnerability (i.e. Heartbleed), trying to prevent the next attack is a full-time job in itself. However,...

Encryption · Industry Commentary · VPN

Ransomware Looks to Blackmail Enterprises

When most people think of threats to their computer systems and networks, the usual suspects come to mind — malware and keystroke loggers that are meant to steal passwords to remotely access corporate...

2 Factor Authentication · Endpoint Management · Industry Commentary

The Target Breach: How Network Security Best Practices Could Have Prevented It

Who would have thought that an HVAC system could lead to the data of millions of people being compromised? Target surely didn’t. Recently, it has come to light that the Target breach hackers likely...

Readers' Poll

Readers' Poll: What Solutions Should Lead the Charge for Enhanced Network Security in 2013?

2012 has been quite the year for the mobile security industry. We've seen bring your own device (BYOD) come to the forefront of discussions, both in terms of its benefits and threats to network...

Readers' Poll

Readers' Poll: What Solutions Should Lead the Charge for Enhanced Network Security in 2013?

2012 has been quite the year for the mobile security industry. We've seen bring your own device (BYOD) come to the forefront of discussions, both in terms of its benefits and threats to network...

Highlights

What We're Reading, Week of 11/5

Government Computer News – NIST spells out baseline security requirements for next-gen mobile devices

Highlights

What We're Reading, Week of 11/5

Government Computer News – NIST spells out baseline security requirements for next-gen mobile devices

Highlights

What We're Reading, Week of 10/22

LinuxInsider – It’s Not You, Android – It’s Your Apps

Highlights

What We're Reading, Week of 10/22

LinuxInsider – It’s Not You, Android – It’s Your Apps

Mobile Security
Industry Commentary

Forward Thinking: Network Security Predictions for 2012

Slimmer bodies, faster Internet connections, and better network coverage makes use of the latest smartphones and mobile devices all the more appealing to the public—and to hackers.

This website uses cookies

We use cookies to personalize content and analyze access to our website. You can find further information in our data protection policy.

OK