You searched for mobile device management/ | SC Media

Your search for mobile device management/ returned 7 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

News remove
Security News remove
Features remove

Your search for mobile device management/ returned 7 results

Sort Results:

Relevant Recent
In Depth

Always connected comes with risks

As Hillary Clinton learned all too well, you can’t be too careful protecting sensitive material, and co-mingling work and personal email on various devices is never a good idea.  WikiLeaks and the outcome of the 2016 presidential election notwithstanding, it behooves all organizations to better examine just how vulnerable their networks are when non-company-issued mobile…
Security News

The best in education

Many cybersecurity curricula fall short of what budding cybersecurity professionals - and the industry - need. These programs stand out because, in short, they "get it" so they "give it."
Insider Threats, Security News

Are employees the weakest (cybersecurity) link? Sometimes

The weakest link in cybersecurity, it’s often said, is the occupant of the space between the chair and keyboard. Indeed, with phishing attacks not only still seeing widespread success but actually on the uptick, employees are arguably a bigger security weakness than any type of technological vulnerability. On the flip side, an enterprise’s people can…
upward graph 700px
Security News

Cybersecurity trends in 2018

End of the year wrap-ups always want to name a year something, like the “Year of Ransomware” or the “Year of Artificial Intelligence,” but it would be difficult to pin 2018 to a specific threat or trend, as so many reared their ugly heads. With that noted, it is pretty simple to define the year…
Security News

Halt, who goes there? Identity access management

In the heady days of the 1970s, no one passed through the doors of Studio 54 without famously being vetted by the trendy club’s bouncers – and with good reason. Not only did the disco want to attract only the hippest or most desirable of celebrities and glitterati, it also wanted to protect them, ensuring…
Security News

Whew! Did all that just happen?

Looking back and forward, the view’s very nearly the same. Threats, threats and more threats. Teri Robinson reports. Out with the old. In with the new. That’s the way the New Year works, right? Except in cybersecurity. The old threats never really go away as the devastating WannaCry, a new twist on an old bug,…
Next post in Security News