There’s no denying that large IT enterprises are becoming increasingly mobile. Research indicates that mobile phone sales worldwide rose to 1.5 billion units last year, and according to new data from ...
Digital Journal: Why is mobile security more complex for enterprises today?
The primary purpose of email in an organization is to relay important information to employees, stakeholders, and associates of the institution. Many institutions do classify how and in what capacity ...
Mobile devices are fairly ubiquitous and represent the "front line" in the cybersecurity battle. RSA introduced Mobile Lock to offer more effective mobile device security with less friction or impact ...
Are smartphones ever entirely secure? It depends on one’s definition of “secure,” particularly when dealing with corporate environments. Most companies with bring-your-own-device policies install apps ...
In the rapidly changing mobile environment of Defense Department security, agency executives are challenged as never before by two stark realities. First, in an ecosystem increasingly shaped by the ...
Twenty percent of security professionals say their company has experienced a mobile device breach, according to a Dimensional Research survey. The survey — titled The Growing Threat of Mobile Device ...
Are security concerns holding back your agency’s mobility strategy? Mobile Work Exchange on Thursday launched the Secure Mobility Hot Zone, a new self-assessment tool that can help you or your agency ...
Organizations deem mobile and Internet of Things (IoT) devices crucial to their operations, but they also recognize that the risk of using these devices has climbed over the past year. In fact, 46% ...
The Department of Homeland Security (DHS) has submitted a report to Congress detailing current and emerging threats to the federal government’s use of mobile devices. The report recommended security ...
As mobile devices proliferate, employees’ use of them is the biggest threat to corporate security, but knowing where the threats is can help inform cybersecurity protocols, according to a Harvard ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results