Device security news stories
As the threat landscape evolves, SASE security models may be the answer
"This survey confirmed that organisations have a gap when it comes to users, devices, and access security. To bridge this gap, organisations should progress to a Secure Access Service Edge (SASE) architecture."
TXOne Networks secures industrial operations with latest release
TXOne Networks, a global provider of ICS and industrial IoT (IIoT) security, has launched a new edition of its portable security device.
The long-tail of COVID and the evolution of ransomware
The long-tail of Covid-19 means security teams are having to deal with user sprawl and device sprawl, causing big headaches in 2022.
Samsung outlines cybersecurity strategy for devices
"While we are generally more mindful today of the dangers posed by hackers to our laptops and computers, we also need to recognise that smartphones are prone to cyberattacks as well."
Trend Micro bolsters security offering with complete device and identity protection
The solution brings together identity theft and dark web monitoring, WiFi protection, password manager and parental controls.
Apple jumps on the Bluetooth tracker bandwagon pioneered by Tile
Apple has entered the market for Bluetooth trackers, pioneered by companies like Tile - but as always, Apple puts its own spin on things.
E-waste becoming a massive issue for businesses, so what can be done?
E-waste is a global concern, and is quickly becoming a crisis of its own, the researchers state. In fact, more than 53 million metric tons of e-waste was produced in 2019.
Nokia phones lead trust rankings finds Counterpoint research
Nokia phones are leading the Android ecosystem in providing the fastest software and security updates across the entire portfolio.
Come 2020, 70% of people will be using smartphones
By 2020, smartphone subscriptions will be more than double, reaching 6.1 billion, and 70% of the world’s population will be using smartphones.
The mobile enemy
Internal data theft can be minimised with a good strategy, if you do it right.
End to end protection
Check Point expert explains why you need endpoint security protection and policies.
Producing a network security policy
Planning a policy is the first step towards good security. Here's how you do it.