Ransomware, regulations, botnets, information sharing and policing strategies were just some of the topics that dominated the "International Conference on Big Data in Cyber Security" hosted by Edinburgh Napier University in Scotland.
In revised guidance, the National Institute of Standards and Technology cautions enterprises to assume that "external environments contain hostile threats" as they establish programs to allow employees and contractors to remotely access critical systems.
Today's IT solutions increasingly leverage multiple heterogeneous platforms including mobile and cloud for mission-critical applications. With these businesses face an ever more challenging landscape and tighter regulatory controls in order to protect their brands and meet the demands of the marketplace. Today's...
The Gartner Magic Quadrant is one of the most influential research tools that IT buyers use to evaluate vendors and keep pace with the accelerating shift from Mobile Device Management activity to Enterprise Mobility Management (EMM) strategy.
Ten years ago the smart phone, and a few years later the tablet, changed...
As more banks and government agencies stop providing free BlackBerries to employees, the beleaguered smartphone manufacturer is attempting to reboot with the launch of its first Android smartphone, dubbed Priv for privacy.
Mobile computing remains a challenge for many enterprises - with an unprecedented explosion of devices and applications. Understanding diversity, avoiding uncertainty and planning ahead are some suggestions from Gartner's John Girard.
In evaluating current or future BYOD policies and deployments, it's important to recognize that your industry
regulations, employee needs and company culture should play a significant role in determining how your
company enables BYOD. One approach does not suit all companies. Even within a company, you may...
BlackBerry plans to buy mobile device management rival Good Technology for $425 million. BlackBerry must prep for a future in which it no longer manufactures hardware - and that's why this deal makes sense.
The bad news is that the new KeyRaider malware has so far compromised more than 225,000 Apple accounts worldwide. The good news, according to Ryan Olson of Palo Alto Networks, is that only modified, or "jailbroken," ioS devices are at risk.
Numerous services are enabled by default in Microsoft's Windows 10, and as employees connect their BYOD equipment to corporate networks, the cloud, collaboration and location tie-ins could pose enterprise security risks, experts warn.
A 2013 Pew Research study revealed one in 10 Americans have used a dating site or app and the number of people who dated someone they met online has grown to 66 percent.1 Today, the goal is work-life integration. Employees multi-task work obligations between banking, gaming, tweeting, networking and yes, even dating....
Gartner's John Girard boils down the mobile security challenge to three topics: the number of devices, diversity of capabilities and the complexity of management. How does he advise CISOs to tackle these challenges?