HackDig : Dig high-quality web security articles for hacker

Should We Disconnect to Improve IoT Security?

When I do media spots, interviewers often ask me, “What is the best single thing you can do to prevent cyberattacks?” I jokingly respond, “Unplug and turn off all your devices — it’s a 100 percent security solution!” Ironically, when discussing Internet of Things (IoT) security, some people believe turning all devices off is an
Publish At:2017-06-26 07:40 | Read:1360 | Comments:0 | Tags:Mobile Security Network Risk Management Bring-Your-Own-Devic

More Mobile Apps Means More Man-in-the-Middle Attacks

When you travel outside your corporate network with your mobile device, you are much more vulnerable to man-in-the-middle (MitM) attacks. This is how attackers intercept data as it’s being passed from a mobile device to a server. Of course, this is problematic for a number of reasons. CSO Online demonstrated how easy it is to steal all sorts of informa
Publish At:2017-06-21 17:10 | Read:1606 | Comments:0 | Tags:Endpoint Mobile Security Application Security Bring-Your-Own

The IoT Is BYOD All Over Again

Internet of Things (IoT) devices are proliferating into unanticipated areas of businesses and personal lives. The explosion of IoT devices follows the familiar pattern of the bring-your-own-device (BYOD) movement, which has infiltrated the same spaces. What differentiates the two categories is the number of items and the cost of individual devices. But whil
Publish At:2017-04-17 20:15 | Read:1246 | Comments:0 | Tags:Mobile Security Network & Endpoint Bring-Your-Own-Device (BY

The Retail Industry and the Challenges of Enterprise Mobility Management

Authored by Ivan Cantero, Product Professional Services for IBM Security. Retail is always a sector with specific difficulties and challenges, and enterprise mobility management (EMM) is another field that IT departments of retail companies have to consider. Besides bring-your-own-device (BYOD) and corporate phones, retail organizations are starting to lev
Publish At:2017-03-23 16:55 | Read:1048 | Comments:0 | Tags:Mobile Security Retail Bring-Your-Own-Device (BYOD) Enterpri

The Enterprise Mobility Conundrum: How to Control the Data?

What’s not to like about a good bring-your-own-device (BYOD) policy? For most companies, BYOD is a great deal. Employees buy and maintain the devices, and the company gets the benefit of their off-hours availability and productivity while traveling. Nearly three-quarters of organizations with enterprise mobility initiatives have adopted a plan to estab
Publish At:2017-03-13 17:00 | Read:1325 | Comments:0 | Tags:Mobile Security Network & Endpoint Bring-Your-Own-Device (BY

The Disconnected Digital World

It’s no surprise that we have seen a nearly constant march toward a highly connected digital world. We are all witnesses to this accelerating digital evolution. It is happening right before our eyes — sometimes quite literally right in front of our eyes, with technologies such as cyber eyeglasses. There is also a continuous stream of discourse on both
Publish At:2017-02-22 20:25 | Read:2344 | Comments:0 | Tags:Cognitive Risk Management Bring-Your-Own-Device (BYOD) Cogni

How to Ensure the Success of a Hot Desking Strategy

The concept of hot desking — the practice of working in a shared office with unassigned desks — has been around for at least a decade. While much has been written about it from a worker’s point of view, employers and IT administrators have had a relatively small voice in the discussion around the latest office craze. Before you even consider whether th
Publish At:2017-01-13 22:00 | Read:2303 | Comments:0 | Tags:Infrastructure Protection Mobile Security Bring-Your-Own-Dev

Bearing Fruit: The Future of Mobile Technology as Apple’s iPhone Turns 10

The rumors have already started. According to Tech 2, talk of the upcoming 10th-anniversary editions of the iPhone 8 includes speculation about three sizes — 4.7 inches, 5.5 inches and a new 5-inch model — along with an all-glass body that would support wireless charging. It’s a far cry from the original iteration of this piece of mobile technology, wh
Publish At:2017-01-09 21:50 | Read:2410 | Comments:0 | Tags:Mobile Security Apple Bring-Your-Own-Device (BYOD) iPhone Mo

BYOD Risks: Should Account Lockout Be Used After Failed Logins?

Bring-your-own-device (BYOD) is an unstoppable force. According to recent research sponsored by Tenable Network Security, 72 percent of organizations allow BYOD, with 40 percent making it available to all employees. Although BYOD risks can compromise enterprise security, the advantages are manifold. A successful BYOD program can improve employee and IT produ
Publish At:2016-12-30 00:35 | Read:1448 | Comments:0 | Tags:Mobile Security Bring-Your-Own-Device (BYOD) Mobile Device M

The BYOD Policy Holiday Challenge

A sophisticated, ingenious and highly distributed mobile threat is gathering its forces, preparing to attack your network at the end of the year. In a steadily growing flood, it is moving from store shelves to hiding places under millions of holiday trees, from where it will launch its stealth attacks. Is your bring-your-own-device (BYOD) policy ready for th
Publish At:2016-12-21 11:45 | Read:2092 | Comments:0 | Tags:Mobile Security Bring-Your-Own-Device (BYOD) Cloud Security

Protect Sensitive Files With Document Security Management

When it comes to data security, documents matter. Most organizations have invested in tools that enable them to securely manage their sensitive documents. They are struggling, however, to compel employees to use these tools consistently and correctly. Throughout the IT industry, actual document management and security practices fall seriously short. Malware-
Publish At:2016-11-21 11:50 | Read:1804 | Comments:0 | Tags:Data Protection Bring-Your-Own-Device (BYOD) Mobile Device M

A Look Back at Mobile Security in 2015

As 2015 draws to a close and a new and exciting 2016 looms, we wanted to review some of the top themes around mobile security: surviving the mobile phenomenon, mobilephobia, bring-your-own-device (BYOD) and the mobile enterprise. Set your new year up for success with a stroll down memory lane. A Big Year in Mobile Security We are living in the mobility age,
Publish At:2015-12-28 20:00 | Read:1924 | Comments:0 | Tags:Mobile Security Mobile Bring-Your-Own-Device (BYOD) Enterpri

The Mobility Minute, Dec. 14–18: Holiday Device Rush, Mobile Retail and More

I promise that’s the last time I’ll sing on the Mobility Minute… in 2015, that is! In this week’s all-new, holiday-inspired edition of the Mobility Minute, we’re giving you best practices for handling the mobile device rush this holiday season and tips for retailers to leverage mobile devices in-store to boost productivity. We&#
Publish At:2015-12-22 01:15 | Read:1272 | Comments:0 | Tags:Mobile Security Bring-Your-Own-Device (BYOD) Enterprise Mobi

Manage Mobile Device Fraud Without Succumbing to Mobilephobia

It’s a sunny spring morning when a woman crosses the large retail store parking lot and enters the building. The woman, wearing a shirt bearing the store’s logo, walks in and advances to the back of the store. She approaches a computer station and swipes an employee ID card to gain access to the retail store systems. Should she get access? Is she
Publish At:2015-12-17 12:45 | Read:2833 | Comments:0 | Tags:Mobile Security Bring-Your-Own-Device (BYOD) Mobile Devices

Mobile Devices: Handling the Holiday Rush

The holiday season is coming, and with it the promise of new mobile devices purchased at steep discounts during Black Friday sales or wrapped and waiting under evergreen trees. While those on the receiving end of these practical and playful presents will be all smiles as they open their new technology, enterprises may not be so merry — what happens these dev
Publish At:2015-11-25 16:20 | Read:1361 | Comments:0 | Tags:Mobile Security Bring-Your-Own-Device (BYOD) Mobile Mobile D


Share high-quality web security related articles with you:)


Tag Cloud