• October 31, 2006 31 Oct'06

    Quiz: Essential practices for securing mobile devices

    A five-question multiple-choice quiz to test your understanding of the content presented in the Essential practices for securing mobile devices lesson of SearchSecurity.com's Messaging Security School.  Continue Reading

  • October 31, 2006 31 Oct'06

    Podcast: Platform protection -- Security issues for mobile devices

    This 10-minute podcast features a Q&A-style back-and-forth interview with Lisa Phifer, a renowned instructor and conference speaker in the realm of mobile security. The podcast summarizes the security issues facing today's popular mobile device ...  Continue Reading

  • October 31, 2006 31 Oct'06

    Taking the bite out of Bluetooth

    Bluetooth has become a ubiquitous short-range wireless protocol embedded in many mobile devices, but it has been plagued by security threats. In this tip, Lisa Phifer details those threats and explains how any organization can stay safe by following...  Continue Reading

  • October 31, 2006 31 Oct'06

    Messaging Security School

    SearchSecurity.com's Messaging Security School has brought together some of the most knowledgeable experts in the messaging security field to offer you personal instruction on how to secure the information handled by your organization's knowledge ...  Continue Reading

  • October 31, 2006 31 Oct'06

    Survey: Data breach costs surge

    A new study by the Ponemon Institute finds a 31% increase in the costs associated with a data breach.  Continue Reading

  • October 31, 2006 31 Oct'06

    Latest IM attacks still rely on social engineering

    In the age of email-borne superworms, email recipients would often become victims without any interaction or warning. However, as Michael Cobb explains, many of today's most dangerous instant messaging attacks require user interaction, meaning wary,...  Continue Reading

  • October 31, 2006 31 Oct'06

    Countermeasures for malicious email code

    Today's malware continues to raise the security stakes. Enterprises are now facing numerous evolving threats like targeted and blended attacks, zero-day exploits, botnets and phishing schemes. The attacks aren't the only things evolving; so are ...  Continue Reading

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close