Bring Your Own Device

Building a trustworthy mobility program

Building a trustworthy mobility program

As device adoption continues to grow, the importance of implementing a secure enterprise mobility program cannot be understated.

Insider threat behavior not just actions: Part two of a series

Insider threat behavior not just actions: Part two of a series

When it comes to insider threats, we often focus on implementing technologies and auditing at the endpoint, but it's the user behavior that we have to get a better grasp of.

Sponsored Video: Julian Lovelock, VP of product marketing, ActivIdentity

By

ActivIdentity's Julian Lovelock discusses challenges in the IT security world today with Dan Kaplan, executive editor of SC Magazine, in this insightful In Focus video.

How mobile security breeds concern for companies

How mobile security breeds concern for companies By

Mobile security problems continue to vex many an IT security officer.

Targeted attacks cost companies an average of $200k

By

A recent survey indicates that successful targeted attacks end up costing companies more than $200,000.

SC Congress Canada: Policies can combat mobile worries

By

Experts at this year's SC Congress Canada in Toronto discussed the challenges of BYOD and how implementing policies may be the industry's biggest weapon.

Malicious software meets BYOD

Malicious software meets BYOD

Bringing together two separate pieces of security research reveals vulnerability to cybercrime on an alarming scale.

Advertisement

How to Prevent Insider Threats!

POLL