BYOD influences enterprise mobile security |
- BYOD influences enterprise mobile security
- CEOs lack visibility into seriousness of security threats
- Free mobile security eBook from Veracode
- Security tips to combat mobile device threats to healthcare
- Insider threat as prime security concern
- nCircle automates new PCI DSS requirements
- Email encryption on iOS and Android
- Secure cloud file sharing for the enterprise
- Tenable Security unveils Log Correlation Engine 4
- Programming Microsoft's Clouds: Windows Azure and Office 365
BYOD influences enterprise mobile security Posted: 14 Jun 2012 04:30 AM PDT The rapid proliferation of consumer mobile devices is changing the traditional IT environment in enterprises, as 90 percent of enterprises have already deployed mobile devices, with smartphones being ... |
CEOs lack visibility into seriousness of security threats Posted: 14 Jun 2012 03:30 AM PDT CORE Security exposed the division that exists between the CEO and Chief Information Security Officer (CISO), on how they view threats to IT Infrastructure security. The survey found that these t... |
Free mobile security eBook from Veracode Posted: 14 Jun 2012 03:00 AM PDT Veracode released a free eBook that outlines the ten steps that can be taken by individuals and organizations to protect against potential security risks brought on by the bring your own device (BYOD)... |
Security tips to combat mobile device threats to healthcare Posted: 14 Jun 2012 02:00 AM PDT Mobile devices are increasingly exposing protected health information (PHI) in the healthcare space, with threat risks growing, according to the Department of Homeland Security. Mobile devices po... |
Insider threat as prime security concern Posted: 14 Jun 2012 01:36 AM PDT Cyber-Ark Software revealed the findings of its annual "Trust, Security and Passwords" report. Whilst the research reveals a growing awareness of external threats among respondents, it is clear that e... |
nCircle automates new PCI DSS requirements Posted: 14 Jun 2012 01:03 AM PDT nCircle PureCloud automates the new internal vulnerability scan requirements included in the most recent update to the Payment Card Industry Data Security Standard (PCI DSS). Effective June 30, 2... |
Email encryption on iOS and Android Posted: 14 Jun 2012 12:15 AM PDT Voltage Security announced Voltage SecureMail Mobile Edition, a comprehensive program designed to extend data-centric security to a new generation of mobile devices. The solution allows mobile us... |
Secure cloud file sharing for the enterprise Posted: 13 Jun 2012 11:30 PM PDT Varonis launched DatAnywhere, which extends the usability of corporate file sharing infrastructure to enable traditional file servers and NAS devices to behave like cloud-based file synchronization se... |
Tenable Security unveils Log Correlation Engine 4 Posted: 13 Jun 2012 11:00 PM PDT Tenable Network Security announced the availability of Log Correlation Engine (LCE) version 4. By combining normalized log data from devices throughout enterprise networks with vulnerability intellige... |
Programming Microsoft's Clouds: Windows Azure and Office 365 Posted: 13 Jun 2012 09:45 PM PDT This book offers an in-depth look at a wide range of cloud topics. It explains how companies can easily scale their cloud use up and down to fit their business requirements. After an introduction to c... |
You are subscribed to email updates from Help Net Security - News To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
0 comments:
Post a Comment