The Latest in IT Security

1

In the era of the cloud, enterprises house sensitive corporate data outside of the traditional perimeter; employees can access this from any endpoint, including mobile devices, and from any network. This presents a host of new challenges for companies looking to protect their sensitive information. On this webinar replay, Threatpost’s Tara Seals is joined by […]

Read more ...

1

A new study conducted by AV-Comparatives, a well-respected independent testing agency, has closely examined whether 250 security products for Android smartphones are capable of protecting users at all. The test evaluated whether Android anti-virus products available in the official Google Play store can protect against the 2000 most common Android malware threats of 2018. Compared […]

Read more ...

1

Why last year’s mobile defense technology is no longer enough A year ago, a conversation about the state of the art of mobile threat defense (MTD) would have included the ability to identify attacks across the various threat vectors – apps, networks, vulnerabilities – and, more importantly, the ability to proactively protect sensitive information, wherever […]

Read more ...

Categories

FRIDAY, MARCH 22, 2019
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments

Social Networks