One of the more difficult aspects of cybersecurity and access management remains the rising rate of end points, with the average employee already having nearly three devices on average. Despite the fact that the Internet of Things and enterprise mobility trends have...
Data breaches have reached somewhat epic proportions in the past several years, with tens of millions of individuals being impacted by just one event at a time, and many more when looking at the full range of damages. For example, the two breaches that struck the...
Organizations in the public and private sectors have appeared to fully embrace the BYOD revolution, enabling remote work through the use of smartphones, tablets and portable computers among their employees. This has been a highly effective and positive trend for...
Mobile developers, be they in the software or hardware field, have become a bit more focused on security in the past few years, as smartphones, tablets and other portable devices have been some of the most common sources of data breaches. Although devices have...
Transcript The U.S. government tries to protect the nation, but can it protect itself? Hi there, and welcome to the SecureKey blog. Network World recently reported that officials from the U.S. military have been concerned about data breaches that have taken place in...