The Latest in IT Security

Posts Tagged ‘mobile’

While data breaches make great headlines, what is often missing from those reports are the details on how the attackers got into the organization in the first place. Mobile devices can be a critical part of any cyber attack. Based on a study of 588 IT and security leaders at Global 2,000 companies, a new […]

Read more ...

As enterprises struggle to keep up with their internal demand for mobile apps, more are turning to more speedy development workflows, such as the Minimum Viable Product (MVP), which essentially calls for mobile development teams to focus on the highest return on effort when compared to risk when choosing apps to develop, and features to […]

Read more ...

Organizations of all sorts are well aware of the need to manage access in order prevent fraud in physical facilities and avoid compromise of their assets. This holds true whether it is staff members at retail store, insurance agents, health care workers or government employees. But what controls can organizations employ when the access is […]

Read more ...


Categories

MONDAY, MARCH 17, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments