You searched for mobile device management/ | SC Media

Your search for mobile device management/ returned 11 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Feature remove
Karen Epper Hoffman remove

Your search for mobile device management/ returned 11 results

Sort Results:

Relevant Recent
Cloud of suspicion
Features

Cloud of suspicion

Cloud computing still is trying to overcome the trust and reliability issues that has made it a questionable proposition for many organizations.
On-the-go defense
Security News

On-the-go defense

This featured article is a sample of our "Mobile Spotlight" issue and discusses mobile apps in the enterprise and how employees downloading them is cause for concern for IT departments.
Features

Top to bottom assurance

When chief executives flout security rules, the losses can be higher than usual. What should organizations do to help their leaders stay on track with cybersecurity? Karen Epper Hoffman reports.
Insider Threats, Security News

Are employees the weakest (cybersecurity) link? Sometimes

The weakest link in cybersecurity, it’s often said, is the occupant of the space between the chair and keyboard. Indeed, with phishing attacks not only still seeing widespread success but actually on the uptick, employees are arguably a bigger security weakness than any type of technological vulnerability. On the flip side, an enterprise’s people can…
Next post in Insider Threats