Articles
Be More Effective, Be More Efficient: The Mantra for Many Adversaries in 2014
Adversaries are committed to continually refining or developing new techniques to conceal malicious activity, decrease their reliance on other techniques that may be more detectable, and become increasingly more efficient and effective in their attacks. Below are just three examples—explored in deta…
Mobile Cloud Security: What CXOs Need to Know
As organizations seek ways to maintain real-time connections with their workforce and customers in an increasingly digital and mobile-centered world, the growth of mobile cloud will be a major force in shaping the business landscape and future tech decisions. The first blog post in this series, by P…
Mobility: No Longer a Risky Business?
Risk. It’s not just a strategic board game; in business it’s the analysis that determines the potential for loss. In today’s organization, the consumerization of IT has led to groundbreaking developments in the mobility space. The broad deployment of BYOD, coupled with the availability of corporate…
As Mobile Social Usage and Constant Connectivity Increases, Security A Top Concern
Survey results from an IDC study recently revealed that people are relying more and more on their smart mobile device as their primary tool for communication and connecting. The study, sponsored by Facebook, highlights some compelling insights about mobility including: Half of the total US populati…
Network Threats Are Hitching a Ride in Mobile Environments [Crosspost]
Protecting Your Business in an “Any to Any” World Innovation never stops in the mobile world, and that rule applies to security threats as well. Network attacks are becoming more sophisticated and even high-tech businesses with the most advanced security may find themselves in the crosshairs as we s…
Network Threats Are Hitching a Ride in Mobile Environments
Innovation never stops in the mobile world, and that rule applies to security threats as well. Network attacks are becoming more sophisticated and even high-tech businesses with the most advanced security may find themselves in the crosshairs as we shift to more devices and anywhere access. Just a f…
1