mobile

Report Details Nature of Threats to Mobile Computing

A report published today by CrowdStrike, a provider of endpoint protection software and services, finds that attacks aimed specifically at mobile computing devices are increasing in both frequency and sophistication. As end ...
Security Boulevard
Mobile-Security-Threats

5 Mobile Security Threats to Recognize

Mobile security has become a top concern for a number of companies, as the average cost of a corporate data breach is $3.86 million. Employees often access and use corporate data through ...
Security Boulevard
mobile app

150 Million People Affected By SimBad Adware on Android

Mobile security has been compromised yet again, as SimBad, a new strain of adware, was found installed on more than 210 Android Apps. The adware was disguised as an advertisement kit and ...
Security Boulevard
To BYOD or Not BYOD

To BYOD or Not BYOD? Let Your Risk Decide

Before the iPhone came to town, BlackBerry was all the rage. No one had smartphones, but all the cool people had a BlackBerry. Technology evolved, and it was soon out with the ...
Security Boulevard
Risk of Using Old Technology

Old Technology: We All Use It, But At What Risk?

How old technology may be introducing security risks to the corporate network We may think of today’s corporate America as a mobile workforce, with everybody conducting business from their phones or tablets ...
Security Boulevard
Security Boulevard’s 5 Most Read Stories for the Week

Security Boulevard’s 5 Most Read Stories for the Week, August 06-10

A new week, a new crop of security stories. Last week, U.S. Military ‘Reaper Drone’ Designs, Eavesdropping on mobile devices, Making security priority and Multifactor authentication adoption made the headlines. In addition, ...
Security Boulevard
Launching a Digital Transformation

Launching a Digital Transformation? Make Security a Priority

Digital transformation efforts—designed to tap the power of mobile, internet of things (IoT) and other edge technology to improve business results—are already underway in many organizations. They will likely shape the way ...
Security Boulevard
Mobile Devices for GDPR Compliance

Organizations Are Overlooking Mobile Devices for GDPR Compliance

The dawn of the European Union General Data Protection Regulation (GDPR) is upon us, but organizations are overlooking the risk of mobile devices. The cost for non-compliance is steep. For example, if ...
Security Boulevard

20 Critical Security Controls: Control 5 – Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers

Today, I will be going over Control 5 from version 7 of the CIS top 20 Critical Security Controls – Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and ...
Loading...