More than 3,000 National Health Service patients had their personal data exposed when an employee lost an unencrypted memory stick in a parking lot, violating NHS policies. But creating policies isn't the same as enforcing them.
Italian surveillance software maker Hacking Team has confirmed that it was hacked and recommends police, law enforcement and government agencies suspend their use of its software, pending a full breach investigation.
OpenDNS's Andrew Hay sees danger confronting many enterprises in the era of the "Internet of Things" as Internet-ready consumer devices, not architected for security, find their way onto corporate networks, often unbeknown to administrators.
Enterprise mobility management suites are the glue that connects mobile devices to their enterprise workflow. End-user computing leaders must consider short-term and long-term objectives amid rapid market changes.
Download this matrix to explore how the market leaders compare.
Infrastructure and operations (I&O) professionals face a difficult mandate: Enable the workforce to navigate the ever-changing landscape of mobile scenarios while continually ensuring that their company's compliance and security needs are met. Mobile device management (MDM) solutions are effective tools to help...
The market for enterprise mobile management software has evolved from a primary focus on MDM to a suite that includes MDM, MAM and MCM as the primary capabilities. This Aragon Research Globe reviews 18 major technology providers in EMM and their strengths and challenges as this market transforms.
Download this...
Organizations of all shapes and sizes around the world have been faced with an influx of mobile devices over recent years. The increasing processing power and affordability of smartphones and tablets means that business users want to and are easily able to use them as part of their everyday working lives: Ovum's...
Content management is at a crossroads. More content is being accessed and shared on mobile devices than ever before. There has been a lot of focus on sharing files, but mobile content management (MCM) goes further to look at the spectrum of content and how it can be managed in the cloud, on mobile devices and in some...
Mobility is transforming enterprises at an unprecedented rate with the continued proliferation of smart devices, explosive development of mobile apps and increased access to work files. Employees are empowered by their organizations to be more productive at any time and from anywhere, adopting policies for Bring Your...
As more people use mobile devices to work, what are the key elements of an Enterprise Mobility Management (EMM) solution that successfully allow content creation, editing, sharing, syncing and pushing to mobile devices? We'll answer that question as well as provide industry specific scenarios and tips to help you...
The Government Accountability Office says banking regulators are not adequately analyzing cyber-risks and calls for congressional action to ensure that all agencies have the same oversight authority.
Hacking Team, an Italian vendor of "easy-to-use offensive technology" that it sells to government agencies, has been hacked. Leaked customer lists reportedly name the FBI and DEA, plus the governments of Bahrain, Russia and Sudan, among others.
The increasingly sophisticated cyberthreats facing healthcare are making privileged access management more critical, says Sudhakar Gummadi, CISO at Molina Healthcare, a managed care company.
Working out the potential return on investment on a new server or application is relatively straightforward - if it enables you to do more in less time, profits are likely to go up, making it worth buying. If there are no obvious benefits, however, and no immediate gains, then the computation is far more...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.