CIOs and IT security pros are concerned about the security risks that millions of Internet of Things devices can pose to their networks and equipment. To address these security concerns, Verizon Enterprise Solutions rolled out last week a managed certificate security service for enterprises to authenticate IoT devices, reported Larry Dignan with ZDNet.
To encourage IT security researches to root out mobile app vulnerabilities, Google is expanding its bug bounty program to include vulnerabilities in mobile apps, wrote Eduardo Vela Nava, security engineer at Google, in a blog post.
In the race to get enterprise customers, mobile security vendors can differentiate themselves by offering top-notch customer service, argued Denise Culver in a Light Reading article.
Employees at critical infrastructure firms are not just connecting their laptops and mobile phones to the corporate network from home, they are also connecting Internet of Things devices residing on their home network to the corporate network.
A security flaw in Verizon's FiOS service exposed email accounts of Verizon customers to hijacking, reports Security Week.
Mobile malware known as DeathRing is being pre-loaded on factory-shipped smartphones destined for the Asian and African markets, indicating that the mobile handset supply chain has been compromised.
Most IT pros surveyed by the Ponemon Institute believe that negligent and careless employees pose the biggest threat to endpoint security in the enterprise.
Google has decided to stop patching vulnerabilities in WebView, which renders webpages on Android devices, for older versions of Android that make up 60 percent of Android devices in use, according to a blog post by Tod Beardsley of Metasploit.
In an era when PCs were the primary endpoint in the enterprise, chief information security officers (CISOs) can no longer take a "set it and forget it" approach to endpoint security, cautions Jon Oltsik, senior principal analyst at the Enterprise Strategy Group.
Android mobile devices are the choice of many employees bringing their personal devices into the workplace. So the security of those devices is upper most in the minds of IT security pros. Yet some critical Android vulnerabilities identified in 2013 and last year still pose risks.