#MWC15: Wearables the Next Generation of Enterprise Mobility
As wearables begin to grow in popularity and enter the workplace in 2015, security must be a key focus for enterprises that wish to add these technologies to their mobile working strategy, Good Technology explained at Mobile World Congress 2015.
ENISA Hopes to Spur Government Cloud Adoption With New Guide
Cloud Security Alliace and Darmstadt university contribute to best practice framework
#MWC15: Hypori Launches DoD-developed BYOD Security for Android
The Android Cloud Environment (ACE) has been co-developed with the US Department of Defense (DoD).
Firewalls Remain Strategic Security Investments
An overwhelming 92% of respondents indicate that firewalls will stand as a “critical” component of their security infrastructures over the next five years.
D-Link Routers Face Multiple Vulnerabilities
An exploit could give an attacker root access, allow DNS hijacking and more.
New Malware Volumes Double in 2014 But UK Stays Strong
Europe has lowest infection rate in the world
Major Chip Kit Maker ASML Hit by Cyber Attack
Local media blames China but photolithography specialist plays down incursion
#MWC15: Consumer Trust Key in Development of Identity Solutions
Debating under the header ‘Mobile Identity Solutions: Developments & Innovations’, a panel of mobile industry experts at Mobile World Congress today explored the key challenges facing the drive and adoption of mobile identity and authentication technologies worldwide.
#MWC15: Complexity of IoT may slow adoption, warns AVG
Complexity is the major challenge that stands in the way of wide-scale adoption of internet of things devices in the home, Yuval Ben-Itzhak, CTO at AVG Technologies, told Infosecurity at Mobile World Congress 2015.
#MWC15: Personal Privacy Has Become an Enterprise Issue, says Silent Circle
Silent Circle has unveiled a new ‘enterprise privacy ecosystem’ that it describes as the “world’s first.”
Over Five Billion Android Apps Vulnerable to Attack – Report
FireEye claims malware and preventable code flaws are increasing risk
Proofpoint to Acquire Emerging Threats
The deal brings together Emerging Threats' threat intelligence with Proofpoint's existing big data platform and threat analytics systems.