Where do your employees put your data at risk?

Where do your employees put your data at risk?

Organizations in the public and private sectors have appeared to fully embrace the BYOD revolution, enabling remote work through the use of smartphones, tablets and portable computers among their employees. This has been a highly effective and positive trend for...
Hot and cold reception for Google’s newest security upgrade

Hot and cold reception for Google’s newest security upgrade

Mobile developers, be they in the software or hardware field, have become a bit more focused on security in the past few years, as smartphones, tablets and other portable devices have been some of the most common sources of data breaches. Although devices have...
Ominous forecast for mobile app security

Ominous forecast for mobile app security

BYOD programs continue to become more prolific with respect to the number of companies that have adopted this approach to enterprise mobility, as well as the diversity of devices that are entering into the corporate infrastructure in the pockets and bags of employees....
Webinar to highlight best practices of mobile security

Webinar to highlight best practices of mobile security

Enterprise mobility has been one of the hottest trends in the public and private sectors for years, while some industries have been struggling with the security and management side of the equation more so than others. For one, banking enterprises have been forced to...
An update on the major Apple data breach controversy

An update on the major Apple data breach controversy

Some of the largest technology firms have been in the news for all the wrong reasons in the past few months, as many have been accused of missing flaws and vulnerabilities in core systems, devices and applications that have directly led to significant instances of...