Organizations are implementing stricter mandates for what kind of platforms and mobile features employees can use on both personal and corporate-owned devices, prompting a dramatic increase in the rise of "shadow IT" like unauthorized messaging apps. By bringing messaging apps out of the shadows and into the mainstream, organizations can reduce the risk of both outside and inside threats to the enterprise.
Connected car technology has been around at least since the mid-1990s, when GM’s OnStar system debuted in 1996. Today, most people think of the connected car as one that is connected to the Internet or some external service for information and entertainment, navigation, and, increasingly, safety. What does this connectivity do to the way we use these vehicles - what is its impact on our our security, our safety?
Whether you’re hitting the same old beach town or taking a cycling tour of Provence, follow these Top Five steps to stay cyber secure while soaking up the sun.
The growing complexity of the cybersecurity industry is undeniable. Through personal examples, Expert Javvad Malik explains why complex problems don't always require complex solutions, pointing to examples such as hybrid cars, which are extremely complex technically, but seamless to use for a consumer.
Modern enterprise is a perpetual tug-of-war between security and convenience. And the latter is winning. What’s an administrator to do?
Despite an increasing number of organizations are choosing to embrace the bring your own device (BYOD) trend, there are still considerable security risks involved that many are not aware of. This article will explain what are the possible security risks involved with BYOD and how to prevent them.
Many SMB employees out there put themselves – and their sensitive data – in harm’s way because they are unaware of the risks and the proper security measures to take. In fact, in many data breach cases, human error is often the culprit.
Communication service providers can protect consumers and their businesses by offering value-added security services can help combat malware threats for users.
As 2016 comes to close, we are faced with many questions about what to expect in the coming year. Will malware ridden homes become the norm? Will mobile payments continue to mature and find their place in major organizations? Will we see physical injuries as a result of digital attacks? Mandeep Khera of Arxan shares his predictions with ITSPmagazine.
Reporters, journalists, and broadcasters are placing cybersecurity bets on behalf of their organization with each story. Expert Eoin Keary explores this world of secrecy and sacrifice.
Breaking into a computer is like breaking into a house. However, breaking into a smartphone is like breaking into a brain. What does this mean? Expert Kevin Haley explains.
Just when you thought it was safe to come to the office, your legacy systems have left you to fend for yourself. In this Experts Corner, expert Greg Hoffer explores the challenges associated with leaving legacy systems behind when moving to new business technologies.
Cybersecurity only works if you actually implement it – otherwise, it’s like having a state-of-the art alarm system on your house but then leaving the bedroom window open for fresh air. Unfortunately, the weakest link in the security chain comes down to the end users.
It seems that fewer companies realize that there are different approaches to MAM. Expert Suzanne Dickson explores the pros and cons of the various enterprise mobile security options available.
“Ask any IT manager, compliance officer or C-level executive what keeps them up at night, and the loss of market confidence, competitiveness and compliance resulting from a mobile data breach is near the top of the list,” said Josh Bohls, Founder, Inkscreen.