Application Security January 13, 2017 The CIO Must Take Charge of the Organization’s Application Portfolio 2 min read - With more businesses turning to SaaS and cloud-based systems, CIOs often lack a proper understanding of the organization's application portfolio.
Application Security January 12, 2017 Protecting Your Staff in Co-Working Spaces 2 min read - Co-working spaces can help companies maximize productivity, but they can also introduce security concerns if employees are not trained to connect securely.
Endpoint January 9, 2017 Bearing Fruit: The Future of Mobile Technology as Apple’s iPhone Turns 10 4 min read - Mobile technology buffs and analysts are hoping Apple will revolutionize the smartphone market once again 10 years after it released the first iPhone.
Software Vulnerabilities January 5, 2017 Android Vulnerabilities: Attacking Nexus 6 and 6P Custom Boot Modes 4 min read - X-Force researchers disclosed several Android vulnerabilities that could enable cybercriminals to use custom boot modes to take over Nexus 6 and 6P modems.
Endpoint December 29, 2016 BYOD Risks: Should Account Lockout Be Used After Failed Logins? 2 min read - For companies with a bring-your-own-device policy, IT managers should create security requirements that address BYOD risks without denting productivity.
Endpoint December 28, 2016 Avoiding the Technology Upgrade? Don’t Dodge Security 4 min read - Consumers are buying new devices at a slow rate, but users who avoid the latest technology upgrade risk missing out on critical security updates.
Endpoint December 21, 2016 The BYOD Policy Holiday Challenge 2 min read - Many employees are sure to return to work after the holiday with brand new mobile devices, creating a variety of BYOD policy challenges for IT managers.
Application Security December 20, 2016 Application Security Truths I Learned While Online Shopping 2 min read - I learned a lot while online shopping for Christmas — including some of the major warning signs signaling false or malicious mobile apps.
December 19, 2016 Root of the Problem? Tordow Malware 2.0 Goes After Top Android Permissions 2 min read - Experts believe the new iteration of Tordow malware, which targets root access to take total control of infected devices, could become a worldwide threat.
Application Security December 16, 2016 10 Application Security Testing Resources You Should Master and Share With Your Executive Team 2 min read - IT managers should review, master and share these 10 application security testing resources to stay ahead of the rapidly evolving threat landscape in 2017.