HackDig : Dig high-quality web security articles for hacker

Enterprise Mobility Management Even the Apprentice Can Control

Everyone else had already left for the day, but the Apprentice felt like his day was just beginning. He knew his internship with the IT department at Wizard, Inc. would be a challenge, but he never expected how challenging his final project — enterprise mobility management (EMM) — would be. The chief information officer (CIO) tasked him with securing all dev
Publish At:2017-10-23 17:50 | Read:2666 | Comments:0 | Tags:Mobile Security Topics Enterprise Mobility Enterprise Mobili

The Time for IT Asset Management Is Now

The benefits of a comprehensive IT asset management (ITAM) program may seem obvious since it provides the data needed to strategically and tactically manage the life cycle of IT assets from purchase to end of life. Of course, companies can leverage IT asset management to reduce costs, improve operational efficiency, determine the full cost of existing invest
Publish At:2017-09-05 09:35 | Read:3818 | Comments:0 | Tags:Data Protection Asset Management Compliance Data Security En

Personal Electronic Devices Dodge TSA Ban — For Now

At least for the time being, business travelers will still be able to take their laptops and tablets along as carry-on luggage when they board a flight. That is the decision by the Transportation Safety Administration (TSA), which lifted its ban on air passengers carrying aboard personal electronic devices larger than a smartphone earlier this summer. The
Publish At:2017-08-25 11:15 | Read:3239 | Comments:0 | Tags:Mobile Security Endpoint Security Mobile Devices Transportat

iOS 11 in the Enterprise: Get Your iPads Ready

While some are in back-to-school mode and others are getting ready for football, we’re gearing up for the latest mobile operating systems to hit the market. With the Apple iOS 11 release right around the corner, the time is now for IT and security leaders to zero in on their Apple iOS management strategy to prepare for the myriad changes set to affec
Publish At:2017-08-23 22:25 | Read:2944 | Comments:0 | Tags:Mobile Security Apple apple releases Enterprise Mobility iOS

Execute Your IoT Deployment by the Book

Organizations contemplating Internet of Things (IoT) deployment projects must look at both past and future challenges through the lens of security. Enterprise data security is not a new topic, but for many companies, IoT deployments present new challenges because they extend the perimeter by introducing thousands of additional endpoints, each of which repres
Publish At:2017-06-27 20:30 | Read:2208 | Comments:0 | Tags:Endpoint Mobile Security Network Connected Devices Endpoint

Should We Disconnect to Improve IoT Security?

When I do media spots, interviewers often ask me, “What is the best single thing you can do to prevent cyberattacks?” I jokingly respond, “Unplug and turn off all your devices — it’s a 100 percent security solution!” Ironically, when discussing Internet of Things (IoT) security, some people believe turning all devices off is an
Publish At:2017-06-26 07:40 | Read:2691 | Comments:0 | Tags:Mobile Security Network Risk Management Bring-Your-Own-Devic

Securing Your Enterprise Assets While Traveling for Work

Traveling for work is a regular occurrence for many of us. Most of the time, traveling for client meetings, conferences, team meetings and other work-related activities also means taking a laptop or other portable devices traveling too. These devices could easily include your company’s IP, strategic plans, financials or other sensitive enterprise asset
Publish At:2017-06-08 16:05 | Read:2724 | Comments:0 | Tags:Data Protection Endpoint Mobile Security Security Intelligen

Four Key Considerations for Managing Your IoT Population

As your Internet of Things (IoT) device population grows, managing it becomes increasingly difficult. More devices means more potentially vulnerable endpoints, more identities to verify and more software to keep up to date. Four Keys to Effective IoT Population Management To effectively manage your IoT population, it’s important to know your users, d
Publish At:2017-06-05 14:15 | Read:2775 | Comments:0 | Tags:Endpoint Mobile Security Network Authentication Chief Inform

The Road to 2020, Part I: Transforming Your Enterprise With UEM

We live in interesting times. With everyone being so well-connected, it’s hard to believe they’re not actually attached at the hip to their smartphones to stay up to date in their personal and work lives. With so many different possible mechanisms to keep in touch, modern workers expect immediate, intuitive access to all applications, content and
Publish At:2017-05-05 01:55 | Read:3987 | Comments:0 | Tags:Mobile Security Endpoint Endpoint Management Endpoint Protec

Five Ways in Which the IoT Will Disrupt Your Business

The Internet of Things (IoT) leverages network connections to communicate between devices and systems, and it is ready to disrupt your business. Enterprises are already deploying smart devices in may ways: Some IoT capabilities are designed to help organizations manage operations, while others are intended to improve customer-oriented products. In either cas
Publish At:2017-05-02 00:35 | Read:3189 | Comments:0 | Tags:Endpoint Mobile Security Network Connected Devices Internet

The IoT Is BYOD All Over Again

Internet of Things (IoT) devices are proliferating into unanticipated areas of businesses and personal lives. The explosion of IoT devices follows the familiar pattern of the bring-your-own-device (BYOD) movement, which has infiltrated the same spaces. What differentiates the two categories is the number of items and the cost of individual devices. But whil
Publish At:2017-04-17 20:15 | Read:2470 | Comments:0 | Tags:Mobile Security Network & Endpoint Bring-Your-Own-Device (BY

IoT: The Internet of Trouble

It might be surprising to note that the number of connected devices outgrew the world population back in 2008. By 2020, on average, each person on the planet will have about six devices. It’s fair to say that the Internet of Things (IoT) has already arrived, but what does this mean, and should you be concerned? Surfing the Tsunami of IoT Challenges Org
Publish At:2017-04-17 01:45 | Read:3262 | Comments:0 | Tags:Cognitive Network & Endpoint Cognitive Computing Cognitive S

Putting IoT Security Front and Center

The Internet of Things (IoT) is not just hype anymore. It is taking off at an enormous rate, and the predictions of 20 billion connected devices by 2020 now sound entirely likely. But as it takes off, so do IoT security challenges for both enterprises and consumers. Obstacles range from software updating issues to employee education and user privacy. But t
Publish At:2017-04-03 11:00 | Read:2614 | Comments:0 | Tags:Mobile Security Network & Endpoint Connected Devices Data Pr

Do We Need to Worry About Shadow IT?

Shadow IT is still a challenge for organizations. With the constant introduction of new productivity and communication tools, as well as the adoption and evolution of existing services, users are more inclined to collaborate outside of IT-sanctioned applications. It is often easier to share information using one of the apps already integrated on our phones
Publish At:2017-03-30 14:55 | Read:2543 | Comments:0 | Tags:Cloud Security Cloud Cloud Applications Mobile Apps Mobile D

Virtual Reality, Augmented Reality and Futuristic Threat Modeling

Augmented reality and virtual reality are no longer theoretical concepts, and both have advanced considerably in their design and use in a wide range of industries. While there are many articles, books, research papers, studies and conferences around these two technologies, only a few venues have explored their potential use as threat modeling tools that co
Publish At:2017-03-23 16:55 | Read:2098 | Comments:0 | Tags:Risk Management Insider Threat Mobile Devices Mobile Securit


Share high-quality web security related articles with you:)


Tag Cloud