I saw a disturbing survey today that was carried out by Vision Critical on behalf of security firm Absolute Software. The survey finds that one-quarter of enterprise workers do not think that data security is their responsibility and that they should face no punishment if they lose sensitive corporate data.
SAN FRANCISCO--Is there an enterprise security perimeter anymore? That was one of the questions tackled by a panel of CISOs and IT execs at the RSA Conference last week.
The worldwide mobile biometrics market is forecast by TechNavio to surge at a 157 percent compound annual growth rate through 2018, fueled by the increasing use of mobile devices for financial transactions.
Virtual security appliances are displacing security hardware in the enterprise network, concludes Michela Menting, ABI Research's senior analyst in cybersecurity.
IT leaders are not concerned about unknown security threats generated by BYOD, mobility, cloud computing and Internet usage, according to a survey of 1,440 global IT leaders by Vanson Bourne on behalf of Dell.
Cloud and BYOD are fueling demand for strong authentication and one-time password products. This demand is expected to boost the market for these products by nearly seven percent per year to $2.2 billion in 2018, according to market research firm Frost & Sullivan.
As Android devices make their way into the enterprise through BYOD, vulnerabilities in the operating system become more of an IT security threat.
While everyone was watching what fixes Microsoft had for Patch Tuesday, BlackBerry issued its own security advisory on Tuesday to plug a security hole in BlackBerry Enterprise Service 10, the Universal Device Service 6 and BES 5.
California lawmakers introduced a bill that would require a "kill switch" for every mobile smartphone or tablet sold in the state.
At the CES International this year, BMW and Audi proudly demonstrated driveless cars that can steer, brake and throttle autonomously using sensors. What they failed to discuss was whether their driveless cars were vulnerable to hijacking by a hacker.