There’s no denying that large IT enterprises are becoming increasingly mobile. Research indicates that mobile phone sales worldwide rose to 1.5 billion units last year, and according to new data from ...
The primary purpose of email in an organization is to relay important information to employees, stakeholders, and associates of the institution. Many institutions do classify how and in what capacity ...
Mobile Threat Defense protects agencies from zero-day exploits and nation-state attacks, closing gaps in legacy cybersecurity ...
Mobile devices are fairly ubiquitous and represent the "front line" in the cybersecurity battle. RSA introduced Mobile Lock to offer more effective mobile device security with less friction or impact ...
Twenty percent of security professionals say their company has experienced a mobile device breach, according to a Dimensional Research survey. The survey — titled The Growing Threat of Mobile Device ...
Organizations deem mobile and Internet of Things (IoT) devices crucial to their operations, but they also recognize that the risk of using these devices has climbed over the past year. In fact, 46% ...
Are security concerns holding back your agency’s mobility strategy? Mobile Work Exchange on Thursday launched the Secure Mobility Hot Zone, a new self-assessment tool that can help you or your agency ...
The Department of Homeland Security (DHS) has submitted a report to Congress detailing current and emerging threats to the federal government’s use of mobile devices. The report recommended security ...
As mobile devices proliferate, employees’ use of them is the biggest threat to corporate security, but knowing where the threats is can help inform cybersecurity protocols, according to a Harvard ...
Users are 6-10 times more likely to fall victim to an SMS phishing attack than an email attack 90% of successful cyberattacks and as many as 70% of successful data breaches originate at endpoint ...
“Management” and “mobility” were words on the tips of many attendees’ tongues at the InfoSecurity 2003 Conference and Exhibition in New York, as leading security technology vendors displayed products ...
While shared mobile devices can deliver value, this can only be achieved when implemented effectively and with clinical ...