Is It Time to Start Certifying Connected Devices?

Connected devices go through hardware checks and certification before they hit the market. The same cannot be said for software checks, which begs the question: Is it time to start certifying devices?

The post Is It Time to Start Certifying Connected Devices? appeared first on Security Intelligence.

Continue reading Is It Time to Start Certifying Connected Devices?

5G Will Change How We Manage Mobile Security — Here’s How to Start Preparing

The rollout of 5G technology could forever change how we manage mobile security, posing an entirely new set of risks we have not handled before.

The post 5G Will Change How We Manage Mobile Security — Here’s How to Start Preparing appeared first on Security Intelligence.

Continue reading 5G Will Change How We Manage Mobile Security — Here’s How to Start Preparing

Mobile Security Versus Desktop and Laptop Security: Is There Even a Difference Anymore?

Do you remember your first mobile phone, and the newfound feelings of connectedness and convenience that came with it? Nowadays, are these devices really phones or are they computers? Labels matter.

The post Mobile Security Versus Desktop and Laptop Security: Is There Even a Difference Anymore? appeared first on Security Intelligence.

Continue reading Mobile Security Versus Desktop and Laptop Security: Is There Even a Difference Anymore?

What Is Endpoint Security Today? Big Data and Mobile Trends Point to the ‘Startpoint’

We can probably all agree that securing the devices on our networks is a fair definition of endpoint security. But within this traditional definition, what, really, is the endpoint of today?

The post What Is Endpoint Security Today? Big Data and Mobile Trends Point to the ‘Startpoint’ appeared first on Security Intelligence.

Continue reading What Is Endpoint Security Today? Big Data and Mobile Trends Point to the ‘Startpoint’

The Language of Business: Where the Board of Directors and Security Leaders Can Meet

IT and security professionals must be able to talk business to the C-suite and the board of directors, especially if new security products need to be added into the organization’s portfolio.

The post The Language of Business: Where the Board of Directors and Security Leaders Can Meet appeared first on Security Intelligence.

Continue reading The Language of Business: Where the Board of Directors and Security Leaders Can Meet

An Apple a Day Won’t Improve Your Security Hygiene, But a Cyber Doctor Might

Internal assessments and audits are necessary, but they have their limitations. Some outside assistance could help improve your security hygiene and inoculate you from the nastiest of cyber bugs.

The post An Apple a Day Won’t Improve Your Security Hygiene, But a Cyber Doctor Might appeared first on Security Intelligence.

Continue reading An Apple a Day Won’t Improve Your Security Hygiene, But a Cyber Doctor Might