Information Week Reports
John Sawyer | 03/04/13
With the perimeter of your organization expanding to include laptops, smartphones, and more, this article provides some very useful and timely information.
Cyber Security Specialist
by admin
Information Week Reports
John Sawyer | 03/04/13
With the perimeter of your organization expanding to include laptops, smartphones, and more, this article provides some very useful and timely information.
by admin
From Dark Reading - By Robert Lemos, Contributing Writer, Dark Reading,
The stories behind the hacking of a startup’s CEO and a journalist, as told at the RSA Conference, provides small and midsize businesses with good tactics to secure their businesses.
SAN FRANCISCO — RSA CONFERENCE 2013 — At first, Matthew Prince and Mat Honen seem to have little in common: Prince is the founder and CEO of CloudFlare, a small business with a rapidly expanding client base. Honen is a writer for well-known news Web site. [Read More]
by admin
Download the Security Threat Report 2013 from Sophos. Reflecting on a very busy year for cyber security, I would like to highlight some key observations for 2012. No doubt, the increasing mobility of data in corporate environments is one of the biggest
challenges we faced in the past year. Users are fully embracing the power to access data from
anywhere. The rapid adoption of bring your own device (BYOD) and cloud are really accelerating
this trend, and providing new vectors of attack [Security Threat Report 2013]
by admin
Sophos Mobile Control 3.0 is now available
It’s packed with exciting new features including, android security, iPhone configuration, Samsung SAFE Configuration, User and Group based compliance, and locate your iOS devices.
Many of your users would rather use their own mobile devices. Sophos Mobile Control 3.0 lets you say yes to Bring Your Own Device (BYOD). Whether you choose on-premise installation or Software as a Service (SaaS), we put you in control of your information. -[ Read More]