Articles
Be More Effective, Be More Efficient: The Mantra for Many Adversaries in 2014
2 min read
Adversaries are committed to continually refining or developing new techniques to conceal malicious activity, decrease their reliance on other techniques that may be more detectable, and become increasingly more efficient and effective in their attacks. Below are just three examples—explored in detail in the newly released Cisco 2015 Annual Security Report—of how malicious actors met […]
Mobile Cloud Security: What CXOs Need to Know
4 min read
As organizations seek ways to maintain real-time connections with their workforce and customers in an increasingly digital and mobile-centered world, the growth of mobile cloud will be a major force in shaping the business landscape and future tech decisions. The first blog post in this series, by Padmasree Warrior, explores how the convergence of mobility […]
Mobility: No Longer a Risky Business?
2 min read
Risk. It’s not just a strategic board game; in business it’s the analysis that determines the potential for loss. In today’s organization, the consumerization of IT has led to groundbreaking developments in the mobility space. The broad deployment of BYOD, coupled with the availability of corporate data and applications, have challenged how we define security. […]
As Mobile Social Usage and Constant Connectivity Increases, Security A Top Concern
2 min read
Survey results from an IDC study recently revealed that people are relying more and more on their smart mobile device as their primary tool for communication and connecting. The...
Network Threats Are Hitching a Ride in Mobile Environments [Crosspost]
1 min read
Protecting Your Business in an “Any to Any” World Innovation never stops in the mobile world, and that rule applies to security threats as well. Network attacks are becoming more sophisticated and even high-tech businesses with the most advanced security may find themselves in the crosshairs as we shift to more devices and anywhere access. […]
Network Threats Are Hitching a Ride in Mobile Environments
2 min read
Innovation never stops in the mobile world, and that rule applies to security threats as well. Network attacks are becoming more sophisticated and even high-tech businesses with the most advanced security may find themselves in the crosshairs as we shift to more devices and anywhere access. Just a few weeks ago, multiple leading social networking […]
1