Application Security April 13, 2015 Think You’re Immune From Mobile Malware Attacks? Think Again 4 min read - While users have improved when it comes to detecting possible threats on their computers, they may be less wary when it comes to their mobile devices.
Advanced Threats April 9, 2015 Top Security Myths That Could Leave Your Organization Vulnerable to an Attack 5 min read - These four pervasive security myths may keep organizations from moving to the higher level of security maturity that is needed to fight today's attackers.
Application Security April 3, 2015 Mobile Payment Technology: Secure or Subpar? 3 min read - With the growing popularity of Apple Pay, Google Wallet and Venmo, users are wondering whether mobile payment technology is secure and safe to use.
Application Security April 1, 2015 Dating Apps and Corporate Directories: Dr. Sleuthe Eistheimer’s New Social Security Productivity Powered by Grumpy Cat 3 min read - Data security for apps is vital, but are other lines of business missing opportunities for efficiency from the wealth of insightful apps held by employees?
Application Security March 31, 2015 Mobility and IoT Security: Why Manufacturers Need to Change Their Mindset 3 min read - With the rise of wearables, the expansion of the smart-home ecosystem and the advent of driverless cars, IoT security should no longer be an afterthought.
Endpoint March 27, 2015 Moving Ahead With BYOD: How to Stay Secure 3 min read - As more and more organizations adopt BYOD, it is important to implement security policies that will keep corporate information in the right hands.
Application Security March 26, 2015 Ensuring Mobile Transaction Security Through Identification, Authenticity and Trustworthiness 4 min read - Identification, authenticity and trustworthiness can ensure mobile transaction security for financial industry-delivered applications.
March 24, 2015 Listen Up: IP Phones From Cisco Enable Eavesdropping 2 min read - IP phones from Cisco are reportedly vulnerable to remote eavesdropping, causing many businesses to be wary of using them until they are fixed.
Endpoint March 23, 2015 Management and Security Implications of the Smartwatch at Work 3 min read - The smartwatch has the opportunity to marry consumer interest and business function and ultimately launch wearable devices into the mainstream.
Risk Management March 20, 2015 How Organizations Can Rebound From March Madness Mobile Misuse 3 min read - With the help of mobile threat management and user education, your organization can make sure the only March Madness upsets that occur are on the court.