Alan Earls

Most Recent Articles by Alan Earls

Taming the third-party threat: Application security

Taming the third-party threat: Application security

The challenge for security practitioners is to make the mobile ecosystem more trustable, reports Alan Earls.

Closing the gate: Data leak prevention

Closing the gate: Data leak prevention

Even when you've got a breach or an insider gone bad, there are still ways to limit the damage and protect data, reports Alan Earls.

Safe tether: Wearables

Safe tether: Wearables

Wearable devices efficiently monitor user activity, but also open new targets for malware authors, reports Alan Earls.

Driven by mobile: The challenge of protecting mobile devices

Driven by mobile: The challenge of protecting mobile devices

Hardware makers and solutions providers seek to find the right formula for protecting devices - and data, reports Alan Earls.

Meetings of the mind: Women at the Podium

Meetings of the mind: Women at the Podium

Targeted events help stake out space for women in the security field, reports Alan Earls.

More Articles by Alan Earls

New year, new threats

Sign up to our newsletters

RECENT COMMENTS

FOLLOW US