Enterprise

Best Android Smart Phones for Business Environments

Smart Phones have now become a necessity in our day-to-day lives and so companies like Google, Huawei, Infinix, Samsung, Motorola, Nokia, RealMe Oppo, Tecno, Vivo, Xiaomi, OnePlus seem to flourish. Keeping aside devices used by individuals, let’s discuss a bit about those used in enterprise environments, where security and data privacy play a crucial role […]

All enterprises are at risk of mobile attacks says Check Point Software Technologies

Checkpoint Software Technologies released a mobile security report of 2021 that states that almost all enterprises operating in the world are at the risk of facing mobile attacks. The report that was compiled after analyzing data collected from Jan’2020 to Dec’2020 from over 1800 organizations gives us an overview of the current trends existing in […]

Inside the Unified Cloud Security Enterprise Buyer’s Guide

This post was originally published by Cloudpassage. Rapid cloud transformation, accelerated by the shift to work-from-anywhere environments throughout 2020, has accelerated the pace of change in nearly every industry. Security teams have been asked to do more with less, securing more cloud assets and workloads than ever before, while adapting to entirely new infrastructures and […]

Bitglass SASE wins Global 2000 enterprise

This post was originally published by Nat Kausik. This Global 2000 company had racks of the latest boxes from the leading next-gen firewall vendor for its corporate locations.  As the enterprise moved applications to the cloud, the firewall vendor recommended more boxes at the perimeter.  Plus the fancy firewall-as-a-service for mobile users on the go.  […]

Monster-Sized Breaches Spell Disaster for the Enterprise

This post was originally published here by Will Houcheime. In the past few years, some major organizations have underestimated the importance of maintaining security over their data and infrastructure as they migrated to the cloud. This has led to many devastating breaches that have affected hundreds of millions of people around the world. Public corporations, private companies, […]

Follow these 3 mobile security measures to protect your Enterprise Networks

Following in-depth mobile security, the strategy can help protect your enterprise network from security, privacy, and compliance related cyber threats which often emerge from vulnerable mobile apps. It’s like strengthening the defense line against major threats which have the greatest potential impact and this simple move will help mitigate 80% of security risks. But here […]

How dating app vulnerabilities can put enterprises at risk

Vulnerabilities in dating apps can not only put enterprises at risk but also could jeopardize enterprise BYOD models says a survey conducted by Kaspersky. The study made by the Russian Cybersecurity firm has examined 9 such apps and came to the conclusion that they are susceptible to man-in-the-middle attacks putting sensitive info at risk. Security […]

Unsanctioned Apps in the Enterprise

This post was originally published here by Prasidh Srikanth. Today, organizations leverage a plethora of software applications to enhance productivity, increase collaboration, and evolve their businesses. Some of these applications are IT approved and are purchased with a license by the organization at large; for example, Office 365, Slack, or Salesforce. These are referred to as licenced, managed, […]

Mobile Security report reveals top blacklisted apps by Enterprises!

Appthority, a company which offers enterprise mobile threat protection has compiled a report which throws light on common apps which could lead to data leakage and privacy risks in enterprises. The report provides a visibility into app usage and risks to inform enterprise policies and helps CIOs and CTOs in taking measures to reduce cyber […]

How businesses can protect their computers from Ransomware like Petya

Worried about Ransomware like Petya crippling your business…? Then just follow these steps to protect your computers from the said malware. 1.) Train your staff to be suspicious- Being suspicious in some cases do works and here’s the best reason to prove it. According to a study carried out by Kaspersky Labs 60% of ransomware […]

Share this page

Sign Up for Your Weekly
Cybersecurity Insiders Newsletter

Sign up for the free newsletter! Join thousands of cybersecurity professionals to receive the latest news and updates from the world of information security.

Thank You For Signing Up!