November 5, 2015 Google’s Project Zero Discovers 11 Security Issues in Galaxy S6 Edge 2 min read - The team at Google's Project Zero has discovered 11 high-impact security issues in Galaxy S6 Edge devices, and Samsung is moving to patch quickly.
Endpoint November 5, 2015 What’s the Difference Between Mobile, Wearables and a Luggage Tag When It Comes to Security? 3 min read - Mobile devices and endpoints still remain the main gateways for wearables to interact with the wider IT environment, and all must be secured.
Endpoint October 6, 2015 Mobilephobia: Is It Paralyzing Your Deployment of a Mobile Security Strategy? 3 min read - An enterprise's mobilephobia could be holding it back from implementing a comprehensive mobile security strategy that covers employees and customers.
Endpoint October 2, 2015 Ask Google: Eight Ways Android for Work Makes Lollipop Sweeter and Marshmallow ‘S’more’ Productive 5 min read - Android for Work Product Management Director Andrew Toy discusses how the management platform can enhance mobile security for an enterprise.
Endpoint September 29, 2015 Scoring Points With Mobility Management and Fantasy Football 3 min read - Fantasy football is a huge market that draws millions of users each year, and many of those players play games on their mobile devices during work hours.
September 28, 2015 New IoT Security Foundation Looks for Confidence in Collaboration 2 min read - IoT security is getting a boost thanks to a new nonprofit organization focused on "promoting excellence" in this emerging field.
Endpoint August 21, 2015 Protect the One That’s Closest to You — Your Mobile Device 2 min read - Organizations that allow employees to use a mobile device to complete business tasks need to have a strong mobile security strategy to protect data.
May 3, 2015 Mobile Threat Report: Dead Apps Walking? 2 min read - Dead apps now pose a serious threat to enterprise security, according to a new mobile threat report. What can companies do to avoid these mobile zombies?
March 24, 2015 Listen Up: IP Phones From Cisco Enable Eavesdropping 2 min read - IP phones from Cisco are reportedly vulnerable to remote eavesdropping, causing many businesses to be wary of using them until they are fixed.
Intelligence & Analytics December 2, 2014 High-Priority Security Principles: Focus on Employees 3 min read - An organization's employees need to be taught proper security principles in order to play their role in keeping the enterprise safe from threats.