Of all the applications you deploy to your endpoints, which ones matter most? It’s an interesting question, especially when you consider the many risks you face when it comes to securing your endpoints and the data they contain.
The UK Information Commissioner’s Office just issued a record fine to UK telecom company TalkTalk in connection with an October 2015 data breach.
What is the goal when a breach report is investigated by the Office for Civil Rights? Jocelyn Samuels, Director of the HHS Office for Civil Rights (OCR), has said that the intent is not limited to identifying the cause of the breach.
Given the amount of corporate data stored in the cloud, public cloud apps have become a top Shadow IT risk for businesses. How have cloud storage apps become so popular in the enterprise?
The role of Chief Information Officers (CIOs) at the state level of government is changing. As the responsibility of IT purchasing shifts to business units and end users, CIOs are having to juggle new technology demands, opportunities and risks.
NIST has released a draft report and guide on the security vulnerabilities associated with endpoint devices. Along with this guide, NIST has opened its draft mobile threat catalogue for public comment.
Companies are haemorrhaging data from the endpoint, and there is no single, clear cause behind this steady flow. According to a new survey by NetEnrich, Corporate IT Hounded by Mobile Security Concerns, 42% of IT pros said their organizations suffered key corporate data loss from a mobile device.
The data on employee endpoints—like laptops, mobile phones, and tablets—is at risk. While theft due to malware is a perennial risk, endpoint data is also at risk of theft through email, cloud storage, and device theft.