Security: Mobile & Wireless


Security Crackers Keep the Pressure On

With World Cup-oriented attacks and a brazen tech-support-by-phone scam, it's business as usual for the ever-creative information security crackers.

Mobile Computing's Tipping Point

Mobile security products fared better than did the broader security market in a very tough 2009. Look for that trend to continue.

The Sleeper Cellular Issue

IT organizations are highly exposed to security breaches through their information worker's mobile devices.

Security Focus in 2010: Internal Threats, Cloud Computing, and Mobile Devices

CA’s chief security architect discusses the three key areas for security professional’s attention this year.

Security Trends in 2010

Security will continue to be a hot-button issue this year. Here’s how to protect your business-critical information.

The Enterprise's Achilles' Heel: Cellular Security

IT shops aren't doing enough to secure their cellular communications. This leaves them wide open to attack. The stakes are high -- and likely to get even higher.

Q&A: Encrypting Flash and Solid State Memory Devices

How self-encryption works to secure data on flash and SSD drives.

Enterprises Throw Out Wi-Fi Welcome Mat to Attackers, Study Finds

A recent report by AirTight Networks finds financial services firms are all but throwing out a welcome mat to wireless attacker

New Threats Unite Security and Systems Management Professionals

To effectively address new security challenges, IT organizations need to tighten coordination and integration between security.

A Tempest in a Twitter

Unless you employ appropriate safeguards, a minor Twitter problem could easily turn into a tempest.

Data Security Trends: Staying Ahead of the Bad Guys

What you can do now to stay a step ahead of the changing vulnerability landscape.

Q&A: Security Breaches and Enterprise Culture

How an enterprise’s culture affects its IT security

Minding the Gap: Security Vendors Look to Plug Holes in Suite Offerings

Security vendors are stepping up their efforts to close the gap between security and operations

The Year in Security and the Fresh Problems Ahead

All things considered, 2008 was a quiet but industrious year on the security front.

Why Enterprises Must Respond to WPA Crack

Organizations should either implement a more secure version of WPA or switch to WPA2, the impregnable successor to WPA

Q&A: Securing Your Endpoints

Endpoints pose security risks to an enterprise, but identifying those endpoints can be IT's biggest challenge.

Analysis: Behind Symantec's MessageLabs Play

Symantec spent more than half a billion dollars to buy its way into the SaaS e-mail and Web security segments

Q&A: Securing Mobile Devices

How to handle the special security risks posed by portable devices

Network Security: How Employees and IT Can Keep Laptops Safe

Your employees may take the corporate laptop on summer holiday and bring back security risks to your network

Security: Batten Down the (IM) Hatches

IM attacks are on the rise, in part because organizations are deploying unified communications platforms without first hardening them against attacks