Posts tagged with enterprise security

Blog · Cloud · Data Security · VPN

Key risks for enterprises committing sensitive data to the cloud

Economic benefits of migrating enterprise IT environments to services providers are starting to outweigh the security concerns hovering over cloud computing. Until recently, organizations have...

Cybersecurity Strategy · Data Security · Endpoint Management · Internet of Things · IT policy · Privacy · VPN

Top Concerns for Digital Assistants in the Workplace

Digital assistants like Amazon’s Alexa/Echo, Apple Homekit and Google Home are increasingly becoming part of the connected home. The Alexa for Business Platform, announced at the end of 2017, is set...

hands-coffee-smartphone-technology
Encryption · Endpoint Management · Mobile · VPN

Mobile payments and security -- money walks, money talks

Once upon a time a mobile phone was something we used for talking. Today making a call ranks sixth on the list of most common uses for a mobile phone. Now there’s a new kid on the block that, in time,...

safe-913452_1920
Cybersecurity Strategy · Encryption · Endpoint Management · Internet of Things

Internet of Things raises fresh security challenges for industry

For many years industries like oil and gas, electricity, agriculture and utilities have relied on operational communications infrastructure outside the main corporate network to collect data and...

Cybersecurity Strategy · VPN

Threat Intelligence-as-a-Service brings SIEM Within Reach of SMEs

Organizations are being targeted by cybercriminals more than ever. According to the latest statistics from Symantec, 52.4% of phishing attacks in December 2015 were against small and medium-sized...

Business infographic icons set. Illustration eps10
Cybersecurity Strategy · IT policy

Big Data and IT Security – SIEM as an Analysis Tool

Over the last few years, gleaning useful information from massive amounts of data has also become more difficult for IT security and approaches to Big Data and information analysis are a critical...

Rethink Remote Access · VPN

Missing the Forest for the Trees: How Cyberattacks in the News Can Mask the Threat to SMBs [VIDEO]

Cyberattacks and data breaches have been making headlines more and more these last few years. Whether it was the 40 million customer credit and debit cards stolen from Target in 2013, the major email...

Hands Around Table
VPN

How Far Does Your Cybersecurity Umbrella Extend?

Network administrators: No matter how impenetrable you think your network defenses are, there are always going to be remote access vulnerabilities that threaten the integrity of your walls. Often,...

Expert Q&A · Industry Commentary · Mobile

SearchNetworking: NCP Explains Mobile Device Management v. Enterprise Application Stores

*Editor’s Note: This column originally appeared in TechTarget’s SearchNetworking.com 

Highlights

What We're Reading, Week of 10/22

LinuxInsider – It’s Not You, Android – It’s Your Apps