Intelligence & Analytics August 15, 2014 Black Hat 2014: Where the Internet of Things Meets Reality 4 min read - Black Hat 2014 illuminated the vulnerabilities of the Internet of Things, according to two IBM researchers who attended the conference.
August 13, 2014 Data Security Gets a Wake-Up Call From Blackphone 2 min read - Blackphone offers a robust security and privacy suite, which is handy for sophisticated users but not a complete solution for all mobile users.
August 11, 2014 IBM Acquires Lighthouse to Help Streamline IAM for Mobile, Social and Cloud 2 min read - Streamlining Identity and Access Management (IAM) for Mobile, Social and CloudImprovements in the digital community have exacerbated the challenges of...
Endpoint August 6, 2014 The New BYOD: Breach-Your-Own-Data? 3 min read - Does the new BYOD landscape point to an evolution of the acronym? Are companies facing a troubling future of breach-your-own-data?
Endpoint July 21, 2014 Is Password Protection Really Enough? 3 min read - Bring-your-own-device (BYOD) is an unstoppable force, but organizations need to take a close look at security and move beyond mere password protection.
CISO July 17, 2014 IT Systems and Security: Building Networks of Trust 2 min read - Business, like all of social life, depends on networks of trust, and the great challenge for IT systems is building those networks.
Endpoint July 16, 2014 State of BYOD and Mobile Security Report: Latest Insights, Trends and Stats 3 min read - The Information Security LinkedIn group has just release a new survey of its community on the state of bring-your-own-device (BYOD) initiatives.
Identity & Access June 30, 2014 The ABCs of IAM Security 4 min read - Traditional IAM solutions are no longer enough to secure your firm's network and information; today's ever-evolving threats require advanced tools.
CISO June 26, 2014 [Free eBook] Practical Guide to Staying Ahead in the Cyber Security Game 2 min read - With security breaches being reported in the news with regularity, cyber security has taken center stage for organizations seeking to protect their assets.
Endpoint June 25, 2014 PC-Grade Malware Going Mobile 3 min read - The discovery of the mobile Trojan SVPENG targeting Russian banks has signaled a significant advancement in the sophistication of mobile malware.