Securing headquarters, data centers, branch offices and mobile users isn’t easy - especially when organizations take a traditional approach toward networking infrastructure using firewalls, VPNs and proxies.
I've seen a number of articles this month about how Distributed Denial of Service (DDoS) attacks evolve through the use of mobile devices. I think the articles blur the lines on several …
Beyond the glitzy hardware and the mind-blowing specs of your smartphone and tablet, the real factor for determining functionality comes from the apps. Most apps are not out do harmful things, but …
Securing headquarters, data centers, branch offices and mobile users isn’t easy - especially when organizations take a traditional approach toward networking infrastructure using firewalls, VPNs and proxies.
I was reading the Japanese newspaper the other day, and a report came out about yet another incident of devices (office printers in particular) that were exposed to unauthorized users. The modern …