To BYOD or Not BYOD

To BYOD or Not BYOD? Let Your Risk Decide

Before the iPhone came to town, BlackBerry was all the rage. No one had smartphones, but all the cool people had a BlackBerry. Technology evolved, and it was soon out with the ...
Security Boulevard
Risk of Using Old Technology

Old Technology: We All Use It, But At What Risk?

How old technology may be introducing security risks to the corporate network We may think of today’s corporate America as a mobile workforce, with everybody conducting business from their phones or tablets ...
Security Boulevard
Security Boulevard’s 5 Most Read Stories for the Week

Security Boulevard’s 5 Most Read Stories for the Week, August 06-10

A new week, a new crop of security stories. Last week, U.S. Military ‘Reaper Drone’ Designs, Eavesdropping on mobile devices, Making security priority and Multifactor authentication adoption made the headlines. In addition, ...
Security Boulevard
Launching a Digital Transformation

Launching a Digital Transformation? Make Security a Priority

Digital transformation efforts—designed to tap the power of mobile, internet of things (IoT) and other edge technology to improve business results—are already underway in many organizations. They will likely shape the way ...
Security Boulevard
Your Smartphone Is Your Best Friend but How Well Do You Treat It?

Your Smartphone Is Your Best Friend but How Well Do You Treat It?

Nowadays there is hardly a person not using a smartphone. Smartphones and mobile devices as a whole have become our best friends that accompany everywhere and help us in a variety of ...
Mobile Devices for GDPR Compliance

Organizations Are Overlooking Mobile Devices for GDPR Compliance

The dawn of the European Union General Data Protection Regulation (GDPR) is upon us, but organizations are overlooking the risk of mobile devices. The cost for non-compliance is steep. For example, if ...
Security Boulevard

20 Critical Security Controls: Control 5 – Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers

Today, I will be going over Control 5 from version 7 of the CIS top 20 Critical Security Controls – Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and ...
Ultrasonic Communications are Creeping into Mobile Apps

Ultrasonic Communications are Creeping into Mobile Apps

Mobile devices are continually expanding their functionality and now contain many sensors and communications channels. Sensors include the device’s camera, microphone, gyroscope and accelerometer, while communication channels include cellular, Wi-Fi, Bluetooth and ...
Equifax Data Breach Hits Half of American Consumers

Equifax Data Breach Hits Half of American Consumers

Equifax, one of the three major credit reporting agencies in the United States, announced that hackers broke into its systems and gained access to the personal information of more than 143 million ...
Loading...