article thumbnail

Washington state AG says T-Mobile is wrongly withholding documents in security probe

GeekWire

T-Mobile CEO Mike Sievert, speaking at a Technology Alliance event in Seattle in May, said security breaches have been a catalyst “to make sure we have the right technology, the right architecture that’s fundamentally protected, and the right level of investment.”

Mobile 117
article thumbnail

The cyber pandemic: AI deepfakes and the future of security and identity verification

CIO Business Intelligence

Security and risk management pros have a lot keeping them up at night. The era of AI deepfakes is fully upon us, and unfortunately, today’s identity verification and security methods won’t survive. And the only way to do this is to leverage advanced security technologies such as mobile cryptography.

59
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Navigating the European 5G Security Debate

Forrester IT

At present it is difficult to remember life before the COVID-19 pandemic, but a key switch that has happened is the large scale shifting of the population to work at home as widely documented. Some mobile operators in the UK recently have had a bit of a bumpy ride with spotty coverage and outages experienced […].

Security 308
article thumbnail

Mobile-Flex: Transformative Technology that simplifies mobile technology

CTOvision

Mobile-Flex® is a Windows Based Server solution that delivers access to any Windows server application on mobile devices, Windows desktops, Surface and Macintosh computers in a safe and secure manner using our patent pending technology that leaves NO trace of data of any nature on the device. To read more please log in. . .

Mobile 258
article thumbnail

Master Mobile Learning: The Best Corporate Training Apps for On-the-Go Education

Kitaboo

The rise of mobile corporate training apps enables on-the-go training and education, allowing professionals to learn on their own schedules and make the most of their time. In this blog, we will discuss the power of mobile learning and explore the best corporate training apps for on-the-go education. Table of Contents: I.

article thumbnail

Four Best Practices for Mobile Enterprise Security

IT Toolbox

There is no denying the power of mobile devices and apps when it comes to improving efficiency and creating lower costs for business owners and employees in all industries. But, it’s also impossible to deny the possible security vulnerabilities that using mobile devices and applications for work can present.

Mobile 100
article thumbnail

Center for Internet Security: 18 security controls you need

Network World

The Center for Internet Security has updated its set of safeguards for warding off the five most common types of attacks facing enterprise networks—web-application hacking, insider and privilege misuse, malware, ransomware, and targeted intrusions. To read this article in full, please click here

Internet 156