You searched for android | SC Media

Your search for android returned 33 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Features remove
Older than 2 years remove

Your search for android returned 33 results

Sort Results:

Relevant Recent
Features

Women to Watch 2018

Jen BrownCompliance and data protection officer, Sumo Logic Jen Brown is the compliance and data protection officer at Sumo Logic where she is responsible for responsible for leading compliance, risk, and privacy efforts for the company. She has more than 20 years of experience in IT security and compliance and has worked as a consultant, external…
Features

GDPR: It’s (just about) here

Like many college students who cram the night before a test - and some writers who test the limits of their editors' patience with their procrastination - many companies have pushed off GDPR compliance, believing either it doesn't apply to them, it's too costly or overwhelming or they can afford to wait and see just how serious regulators are about admonishing and fining companies who falter on privacy. Big mistake.
Security News

Whew! Did all that just happen?

Looking back and forward, the view’s very nearly the same. Threats, threats and more threats. Teri Robinson reports. Out with the old. In with the new. That’s the way the New Year works, right? Except in cybersecurity. The old threats never really go away as the devastating WannaCry, a new twist on an old bug,…
Malware

The Top Cybersecurity Threats for 2017

In 2017 hackers weren’t slackers. The threats – and the attacks – kept coming in rapidfire. In a year drowning in threats, these newbies made their mark. EternalBlue: Since 2016, the mysterious threat group known as The Shadow Brokers has been leaking a trove of cyber weapons apparently stolen from the NSA. Of these purloined…
In Depth

Always connected comes with risks

As Hillary Clinton learned all too well, you can’t be too careful protecting sensitive material, and co-mingling work and personal email on various devices is never a good idea.  WikiLeaks and the outcome of the 2016 presidential election notwithstanding, it behooves all organizations to better examine just how vulnerable their networks are when non-company-issued mobile…
Features

Book of Lists

Every December, we take a look back to gather up some of the year's biggest trends and some of the whackiest happenings in the cybersecurity space.
Next post in Features