Mobile device proliferation in the enterprise and increasing deployment of virtual environments is spurring growth in the market for corporate endpoint security.
Spending on IT security is forecast by Gartner to increase 8 percent year-over-year in 2014, reaching $71 billion, and another 8.2 percent year-over-year in 2015 to total $77 billion.
While hotel chain Wyndham is challenging the FTC's right to take action against firms over IT security lapses, the agency is moving ahead with enforcement efforts, issuing final orders this week settling charges against Fandango and Credit Karma over insecure mobile apps allegations.
While BYOD has increased the productivity of today's workers, it has also introduced a range of security threats, such as malware, direct attacks, data loss or theft and social engineering.
Enterprises in the Asia-Pacific region are increasingly adopting mobility. However, few of those firms have a clear strategy of how to use mobile devices effectively in the workplace, a survey by IDC finds.
The Blackphone, a smartphone offering encrypted communications (phone calls, browsing, email, text), made headlines at last week's DEF CON conference in Las Vegas. Unfortunately, most of those headlines were inaccurate.
Read the hottest MobileIT news for Wednesday, August 13, including what's more to rugged tech development, Nvidia's detail release on Project Denver, advice for T-Mobile to take Illiad seriously, Lookout Mobile Security's eyes on the enterprise and SeaWorld's CIO on mobile app development.
Many early attempts at 'Windows tech support' scams--with a caller telling the victim that their computer is sending out tech support requests--had a lower success rate because U.S. targets were put off by the heavily accented English of offshore scammers.
Mobile security is a hot topic at the Black Hat security conference being held this week in Las Vegas. I am here at Black Hat and will be sharing mobile security insights with you in the coming days.
Apple is defending the undocumented services resident on iOS devices, which security researcher Jonathan Zdziarski says can be used as a backdoor to sensitive data, as a diagnostic tool for enterprise IT departments, developers and AppleCare service personnel.