Enterprise Mobile Security – My Mobile Perspective
Posted on 17 December 2015 by
Here are a few suggestions to keep in mind in order to accommodate your employees’ demands for better user experience in mobile environments.
Posted on 17 December 2015 by
Here are a few suggestions to keep in mind in order to accommodate your employees’ demands for better user experience in mobile environments.
Posted on 15 December 2015 by
Employees demand enterprise mobility and want to use personal devices, hence accelerating the bring your own device (BYOD) trend.
Posted on 03 December 2015 by
As 2015 comes to a close, and IT, security and compliance leaders draw on the developments of the past year to plan for a more digitally secure 2016, here are some takeaways to keep top of mind when sketching plans on the whiteboard or reviewing financial statements. The Cost of a Data Breach The IBM […]
Posted on 02 December 2015 by
This year’s Gartner Identity and Access Management Summit, held in Las Vegas, NV from December 7 -9, will deliver strategic insights for IAM in the digital age, as well as the latest tactics in IAM architecture.
Posted on 11 November 2015 by
After a list of Comcast email accounts were offered for sale in an underground store, consisting of customers’ Comcast email addresses and associated passwords, Comcast—one of the largest providers of cable, internet and phone services in the US—forced a password reset on those accounts. Of the 600,000 accounts offered for sale, 200,000 were found by […]
Posted on 29 October 2015 by
The domino effect of technology has always fascinated me – especially when it comes to what prompts the evolution of cyber security solutions and how quick enterprises embrace security best practices. For example, it’s not news that the increasing capabilities of mobile devices and the networks supporting them means employees are able to get more […]