Vox Mobile has prepared a list of tips that can help you develop an effective BYOD strategy.
Browsing: Malware and Vulnerabilities
A number of information security experts comment on ongoing investigations into a possible data breach at Staples.
Charles Sweeney reflects on some companies’ hesitance to move to the cloud.
Acumin provides some basic information about Shellshock, including what users should do to protect themselves.
Intercede in its latest research has found that the security of corporate data across the UK is being compromised by workers’ ignorance of BYOD policies.
Corporate boards need to get off the dime and fund their IT security departments with the tools to stop “identity,” i.e. root-based, attacks.
Veracode has released analytics from its cloud-based platform revealing the vulnerabilities created by the use of open source and third-party components.
While there has been much talk about how Apple Pay might disrupt the payment system, and how easy it will be to use, its security is being overlooked.
Services such as Optimise Direct are an important way for us to blend security and cost savings together and thereby create SaaCS.
With malware for Mac OS X on the rise, ESET researchers have put together several tips on how to stay safe on Mac platforms.