mobile devices

Building a Network Security Solution: NG Firewall and Endpoint Security

As 2020 started, ransomware and phishing attacks continued to make the news. As we moved into May, it became clear…

4 months ago

Building a Network Security Solution: NG Firewall and Endpoint Security

As 2020 started, ransomware and phishing attacks continued to make the news. As we moved into May, it became clear…

4 months ago

Increase in Small DDoS Attacks Could Take Down VPNs

Data breaches and ransomware might hog the headlines, but don’t forget to pay attention to DDoS attacks. According to research…

8 months ago

DevOps Chats: Free Remote Endpoint Protection From Qualys

Many companies are responding to the large number of people working from home as a result of the public health…

8 months ago

Why Sign in with Apple Is a Good Thing

Mobile app developers who care about security will be excited to implement Sign in with Apple and see how this…

9 months ago

Lack of Mobile Strategy Creates Security Holes

How a security-focused mobile strategy can help organizations stay safe in their digital transformation efforts and beyond The focus of…

12 months ago

Report Details Nature of Threats to Mobile Computing

A report published today by CrowdStrike, a provider of endpoint protection software and services, finds that attacks aimed specifically at…

1 year ago

5 Mobile Security Threats to Recognize

Mobile security has become a top concern for a number of companies, as the average cost of a corporate data…

2 years ago

150 Million People Affected By SimBad Adware on Android

Mobile security has been compromised yet again, as SimBad, a new strain of adware, was found installed on more than…

2 years ago

To BYOD or Not BYOD? Let Your Risk Decide

Before the iPhone came to town, BlackBerry was all the rage. No one had smartphones, but all the cool people…

2 years ago