May 31, 2017 Cloak-and-Dagger Attack Creates Android Device Takeover Risk 2 min read - Your Android device could be at risk from a new class of attack that allows for full takeover of a smartphone with valid permissions.
May 26, 2017 Survey: IT Leaders Concerned About Mobile Workforce Security Challenges 2 min read - A survey revealed that IT leaders are struggling to strike a healthy balance between the benefits and security risks associated with a mobile workforce.
May 17, 2017 Don’t WannaCry No More: Ridding Ransomware With IBM MaaS360 With Watson 3 min read - MaaS360 cognitive UEM allows you to manage all endpoints from a single platform, making it easy to keep all systems current with software updates.
May 16, 2017 WhatsApp Scam: Nope, There’s No Free Netflix! 2 min read - A new WhatsApp scam employs social engineering tactics and dangles false promises of free Netflix subscriptions to trick users into spreading the malware.
Endpoint May 11, 2017 The Road to 2020, Part II: Transforming Your Enterprise With IoT 5 min read - To protect sensitive data from emerging threats associated with the rise of the IoT, security analysts must adopt a centralized approach to UEM.
Endpoint May 4, 2017 The Road to 2020, Part I: Transforming Your Enterprise With UEM 6 min read - Unified endpoint management (UEM) can assist security teams in preparing for the future of business transformation and mobile security.
Application Security May 3, 2017 Who Is Responsible for IoT Security? 2 min read - As the Internet of Things grows and mobile devices become increasingly connected, the security community must define who is responsible for IoT security.
Network May 1, 2017 Five Ways in Which the IoT Will Disrupt Your Business 2 min read - If approached with a solid focus on security, the IoT has the potential to disrupt your business in a way that helps it become more efficient.
April 27, 2017 Smart Cities, Big Problems? The Risk of Malware in IoT-Enabled Infrastructure 2 min read - Smart cities offer big benefits for citizens and governments alike, but are they at increased risk of potentially crippling malware attacks?
Data Protection April 25, 2017 How IoT Data Analytics Will Give Businesses a Competitive Edge 2 min read - Given the growing number of connected devices, organizations are beginning to leverage IoT data analytics to drive better decision-making.