With the proliferation of machine-to-machine (M2M) devices and connections, some estimates putting the number as high as 50 billion devices by 2020, security pros are trying to come to grips with the security implications of all those endpoints.
As Apple prepares to launch two iPhone 6 versions and a rumored iWatch, some are questioning whether Cupertino's reputation for iron-clad security is deserved.
Popular Android apps, such as Instagram, Grindr, and OkCupid, have failed basic security testing, putting close to 1 billion users' privacy at risk.
In response to the recent celebrity photo hack, Apple is including two-factor authentication security for mobile iCloud logins in its iOS 8.0 operating system, scheduled for rollout later this month.
The top news stories for Sept. 4, 2014.
Mobile device proliferation in the enterprise and increasing deployment of virtual environments is spurring growth in the market for corporate endpoint security.
Spending on IT security is forecast by Gartner to increase 8 percent year-over-year in 2014, reaching $71 billion, and another 8.2 percent year-over-year in 2015 to total $77 billion.
While hotel chain Wyndham is challenging the FTC's right to take action against firms over IT security lapses, the agency is moving ahead with enforcement efforts, issuing final orders this week settling charges against Fandango and Credit Karma over insecure mobile apps allegations.
While BYOD has increased the productivity of today's workers, it has also introduced a range of security threats, such as malware, direct attacks, data loss or theft and social engineering.
Enterprises in the Asia-Pacific region are increasingly adopting mobility. However, few of those firms have a clear strategy of how to use mobile devices effectively in the workplace, a survey by IDC finds.