How Unified Policy Management Can Enable Business Flexibility, Productivity and Security

Do laptops have a place in the modern workplace? With more than 57 percent of enterprise internet usage occurring over

Read more

Clone or Swap? SIM Card Vulnerabilities to Reckon With

The most commonly used computer platform nowadays is no longer a desktop or a laptop — it’s a phone. According

Read more

Mobile Security Risks Are on the Rise, But Employers Continue to Cut Corners

Mobile devices have taken over the enterprise. Ninety-five percent of us own a cellphone, and a full 100 percent of

Read more

What Happens When Malware Sneaks Into Reputable Hardware, Applications and App Stores?

To avoid malware, you should always get hardware and software from official, authorized and reputable sources and vendors, right? But

Read more

Preparing for the Unpredictable: Security in a New World of Mobile Malware

Mobile malware is nothing new. But in recent months, attackers have been getting more creative and resourceful with how they

Read more