IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Mobile Security

RSS Feed   
Mobile Security Reports
 
Employee Habits that Can Put Your Company at Risk
sponsored by Panda Security
WHITE PAPER: While maintaining secure devices and networks is critical to an organization's cybersecurity, it's not the only thing companies should focus on. When it comes to keeping an organization secure, employees are often the weakest link. Download this white paper to learn how employees are threatening your company and ways to prevent it.
Posted: 28 Jan 2019 | Published: 28 Jan 2019

Panda Security

Core - DNS - Punycode: Awareness and Protection
sponsored by Cisco Umbrella
WEBCAST: Have you ever come across a domain name that was almost identical to a familiar site, but instead was a malicious link? If so, you’ve likely come across a specific kind of attack known as Punycode. In this short webinar, explore Punycode: what it is, how it is commonly used, why it’s important & examples to keep an eye out for.
Posted: 04 Feb 2020 | Premiered: Dec 16, 2019

Cisco Umbrella

Board Ready Endpoint Resilience in 5 Steps
sponsored by Malwarebytes
EBOOK: The increasing popularity in mobile workspaces and BYOD devices has transformed the way CISOs have to think about security. With cyberattacks on the rise, implementing endpoint resilience has become critical. In this e-book, uncover the 5 essential steps to establishing endpoint security and the recommendations for achieving each step.
Posted: 23 Jan 2020 | Published: 23 Jan 2020

Malwarebytes

Core - DNS - Employees Like to Use Unsanctioned Apps - and Don’t Plan to Stop
sponsored by Cisco Umbrella
WHITE PAPER: It’s an unfortunate truth that employees are going to download unsanctioned apps. While these apps may boost productivity, they also expose your network to risk. Don’t wait for threats to strike – download this white paper and discover a new approach to network security that means no more playing defense.
Posted: 06 Feb 2020 | Published: 06 Feb 2020

Cisco Umbrella

Protect your users and devices with Cisco Umbrella and Cisco AMP for Endpoints
sponsored by Cisco Umbrella
DATA SHEET: An estimated 70% of breaches start on endpoints – laptops, workstations, servers and mobile devices. Why are attackers targeting endpoints, and how can an organization better defend itself? Read this solution brief to discover how combining Cisco Umbrella and Cisco AMP can allow you establish effective endpoint protection.
Posted: 17 Jan 2020 | Published: 17 Jan 2020

Cisco Umbrella

Lookout discovers Monokle, new mobile surveillanceware
sponsored by Lookout
WEBCAST: In July of 2019, Lookout’s Security Research team announced its discovery of Monokle, a set of mobile surveillanceware tools. These tools were connected to a Russia-based company sanctioned by the U.S. Government in connection with the 2016 Presidential election. Continue to watch a brief video highlighting this discovery!
Posted: 22 Nov 2019 | Premiered: Aug 13, 2019

Lookout

Network Protection and UTM Buyer's Guide
sponsored by Sophos
WHITE PAPER: This white paper explores how this UTM solution can provide the highest standards of network security within the cloud, while integrating multiple security capabilities on a single platform.
Posted: 03 Jul 2014 | Published: 31 Dec 2013

Sophos

Securing Your Network in the Wireless Age
sponsored by Aruba Networks
EGUIDE: In this e-guide, you will learn how enterprise WLAN is growing in size and importance, driving up the need for more secure wireless network. Find out how vulnerable your wireless network could be and what happens when WLAN security is ignored.
Posted: 01 Mar 2016 | Published: 24 Feb 2016

Aruba Networks

Secure Your Internal Corporate Networks With ABAC
sponsored by Cryptzone
EGUIDE: In this e-guide, discover how ABAC can provide your network with a robust security method that addresses security issues caused by growing remote access and BYOD trends. You will also learn how continuous network security monitoring can allow your enterprise to detect and prevent future cyber-attacks from occurring.
Posted: 27 Jan 2016 | Published: 25 Jan 2016

Cryptzone

Malware Hitching a Ride on Mobile Apps?
sponsored by SearchSecurity.com
EBOOK: The latest mobile app security threats ride into enterprises on employee devices, but you can learn the latest strategies for improving corporate BYOD security.
Posted: 27 Jun 2016 | Published: 20 Jun 2016

SearchSecurity.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info