Remove Device Management Remove Information Security Remove Mobile Remove Security
article thumbnail

Fixmo Announces Expanded Collaboration with Samsung, Enhanced Support for Samsung KNOX Secure Mobile Platform

CTOvision

Fixmo Announces Expanded Collaboration with Samsung, Enhanced Support for Samsung KNOX Secure Mobile Platform. Today at Mobile World Congress, Fixmo announces the expansion of its collaboration with Samsung, the world’s largest smartphone manufacturer. About Fixmo.

Mobile 242
article thumbnail

NASA Audit: Cyber Risk Skyrockets with 'Work from Home'

SecureWorld News

A new security audit reveals that cyber bad actors hit the National Aeronautics and Space Administration (NASA) with more than 6,000 attacks during the last four years. When your employees suddenly shifted to work from home during the pandemic, did you see an increasing number of IT security policy violations?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

The Endpoint Imperative: The Perimeter is Dead; Long Live the Perimeter!

Cloud Musings

Cloud, mobility and the Internet of Things have obliterated the traditional perimeter that protected organizations. The result: Higher productivity, but bigger challenges for security, data protection, and mobile device management. With me is Yasser Rasheed Director of Business Client Security with Intel.

article thumbnail

The BYOD Problem

Cloud Musings

To an employer, however, that smart device is nothing more than a dagger posed to rip apart every shred of corporate security. This reality of modern business was highlighted by the Information Security Community on LinkedIn through their 2016 Spotlight Report on “Bring Your Own Device” (BYOD).

Mobile 70
article thumbnail

Averting turbulence in the air

CIO Business Intelligence

The diversification of payment methods and gradual increase in the volume of online transactions have cast a spotlight on the need for payment security compliance within the airline industry. With the new, recently onboarded Payment Card Industry Data Security Standard (PCI DSS) v4.0, she wonders. Well not exactly. The PCI DSS v4.0,

article thumbnail

How to Choose the Best Vulnerability Scanning Tool for Your Business

Galido

After all, it’s all for the security of your business! While some of these integrate with Windows products (like Microsoft System Center) and provide intelligent patch management, some others function with mobile device managers. Software-Based Vulnerability Scanners: Ideal for medium-sized and large enterprises.

Tools 84
article thumbnail

Penetration Testing Remote Workers

SecureWorld News

Personal email addresses that may be on the same BYOD (Bring Your Own Device) assets. These are off limits regardless of where the BYOD is located, and organizations should use a Mobile Device Management (MDM) solution to provide email segmentation and data management.

Social 89