You searched for mobile device management/ | SC Media

Your search for mobile device management/ returned 19 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Feature remove
Cyberthreats remove

Your search for mobile device management/ returned 19 results

Sort Results:

Relevant Recent
Back to basics for enterprise defense
Features

Back to basics for enterprise defense

Implementing proper security practices protects against today's and tomorrow's risks, says Vicki Ames, former information system security officer at a federal medical research agency .
Encryption: Why now?
Features

Encryption: Why now?

Tools to encrypt sensitive data have been with us at least since the reign of Julius Caesar, who used a simple letter-shifting code to communicate with his generals. Encryption now is on the front lines of the war on data theft, tipping the battle in favor of the "good guys."
The next generation
Features

The next generation

AIG's CSO Paul DeGraaff says security professionals must gauge the risks of a younger workforce, Dan Kaplan.reports.
Features

Market forces: Supply and demand

The market, not government regulation, will push IoT security to a higher standard, says John Ellis of Ellis & Associates. Lee Sustar reports.
Safe development: Safeguarding web applications
Features

Safe development: Safeguarding web applications

Age-old vulnerabilities, like SQL injection and cross-site scripting, remain prevalent in applications. And that trend will continue, unless there is a fundamental shift in how programs are developed and secured.
Next post in Features