Mobility

The Latest News

  • Interview

    How to Ensure Security and Convenience

    VASCO's Benjamin Wyrick on Mobility's Untapped Potential By Tom Field
    How to Ensure Security and Convenience

    For years, security leaders have struggled to find the balance between ensuring strong security and maintaining customer convenience. Benjamin Wyrick of VASCO Data Security says mobility may be the answer.

  • Interview

    Medical Device Security Often Neglected

    Expert Warns Against Overlooking Devices in Risk Management By Marianne Kolbasuk McGee
    Medical Device Security Often Neglected

    Despite the growing attention that federal regulators have been giving to medical device cybersecurity, many healthcare organizations still neglect those devices in their risk management and compliance programs, says security expert Andrew Hicks.

  • Article

    Report Spells Out Medical Device Risks

    Makes Recommendations for Boosting Cybersecurity By Marianne Kolbasuk McGee
    Report Spells Out Medical Device Risks

    A new report serves as a reminder about the importance of medical device cybersecurity. But it's also a wake-up call for healthcare organizations to seriously consider consumer wearable health devices in their risk management strategies.

  • Article

    Apple Watch: 8 Security Issues

    Experts Outline Privacy, Tracking and Fraud Concerns By Mathew J. Schwartz<br>Tracy Kitten
    Apple Watch: 8 Security Issues

    Apple has unveiled its long-awaited Apple Watch, which the company will begin shipping in nine countries on April 24. Security experts highlight the use of Bluetooth and Wi-Fi as potential security concerns and discuss other security-related issues.

  • Article

    Apple Pay: Authentication a Soft Spot

    Mobile a Breeding Ground for Counterfeit Card Fraud By Tracy Kitten
    Apple Pay: Authentication a Soft Spot

    New exploits linked to Apple Pay aren't compromising the mobile device's security, but instead are taking advantage of lax authentication practices used by banking institutions to verify cards that are loaded to the iPhone for Apple Pay purchases.

More news...
ARTICLE Threat Intelligence - Define, Share

Everyone is talking about threat intelligence. But what are they actually doing to create...

Latest Tweets and Mentions

ARTICLE Threat Intelligence - Define, Share

Everyone is talking about threat intelligence. But what are they actually doing to create...

The ISMG Network