You searched for mobile device management/ | Page 6 of 23 | SC Media

Your search for mobile device management/ returned 222 results

Your search for mobile device management/ returned 222 results

Sort Results:

Relevant Recent
Security News

Bring the outside in

Intel et al are selling the wonders of mobility, but security chiefs need to build freedom into policy, says René Millman
Is danger looming: Mobile vulnerabilities
Features

Is danger looming: Mobile vulnerabilities

With users flocking toward mobile platforms, fraudsters will join as well. But businesses have a bigger problem: What to do about employees wanting to use their devices to connect to the corporate network.
Security News

Risks and rewards of a wireless LAN

Wireless local area network (WLAN) technology was deployed at Mount Allison University to enhance on-the-go productivity of our students, faculty, staff and administrators. Whether it's conducting research, exchanging ideas or gaining access to useful operational information, campus users can now perform such functions in real-time without breaking stride from their daily routines.
Features

Tips for WLAN security

Don’t overlook the importance of sound policy in your efforts to achieve effective security, says Bob Whelan
Features, Security News

Rethinking cyber risk

Everyone agrees that risk is essential. They just have different versions of what risk is, Evan Schuman reports. It’s time to rethink risk – both how to operationalize it and how to define it. With all the incompatible views of risk from different stakeholders through an enterprise, it’s hardly surprising that so many organizations struggle…
Security News

Do you know where your data is?

As we are all aware, there has been a rash of reported privacy breaches recently. This likely is because not only is our enterprise data more transient and mobile, but we are having increasing difficulty controlling where that data goes and what controls, if any, go with that data. And that assumes that we actually know where our data is, and who is doing what with it. The sad truth: information security professionals often do not know the location of their enterprises' data.
Border patrol: Perimeter defense
Features

Border patrol: Perimeter defense

The perimeter is a distant memory of what it once was, considering the influx of third-party workers combined with new technologies, such as cloud and mobile. But it still needs safeguarding.
Next post in Features