Evaluate
Weigh the pros and cons of technologies, products and projects you are considering.
Social media security risks and real time communication security
Windows 10 Wi-Fi Sense for hotspot sharing: Is it safe?
Microsoft's Windows 10 Wi-Fi Sense was designed to make hotspot sharing easy, but experts debate if the security risks are real and whether the new feature offers substantial benefits and relative safety. Continue Reading
How does OpenPGP encryption improve messaging security?
Facebook added OpenPGP encryption to its messaging services to help improve messaging safety. Expert Michael Cobb explains the benefits of the approach. Continue Reading
What are enterprise social media best practices for CISOs?
CISOs need to follow certain enterprise social media best practices if they want to safely maintain public profiles. Expert Mike O. Villegas has ten best practices for social media. Continue Reading
-
What VoLTE security risks should enterprises be aware of?
Mobile devices are coming enabled for VoLTE for voice and video calling, but what are the risks? Network security expert Kevin Beaver explains. Continue Reading
Does Peerio offer secure enterprise messaging and file sharing?
A new app for end-to-end encrypted messaging and file sharing is available, but is it ready for enterprise use? Expert Michael Cobb explains. Continue Reading
Can eavesdropping over the SS7 protocol be prevented?
Recently revealed insecurities in SS7 have left many unsure about the well-used protocol needed for phone connections. However, the answer to achieving security is not easily obtained.Continue Reading
Is the Boeing Black self-destructing phone enterprise-grade?
The Boeing Black self-destructing phone puts security first, but does it fit into an enterprise's mobile security scheme? Expert Michael Cobb explains.Continue Reading
Are there new spam rules to mitigate spam techniques?
Expert Nick Lewis explores the latest spam defense methods and products that will help enterprises defend against new and emerging spam techniques.Continue Reading
How does Pretty Easy Privacy secure online communications?
The open source Pretty Easy Privacy project is a user interface that helps users secure communication channels. Expert Michael Cobb outlines how it works.Continue Reading
Should enterprises encrypt audio for secure headset communications?
Encrypting communications between a headset and an audio jack may be crucial in certain situations to mitigate attacks. Enterprise threats expert Nick Lewis explains.Continue Reading
-
Skype vs. Tox: Which is better for secure communications?
Securing enterprise communications has become a top concern lately. However, finding the application that best suits your enterprise security needs can be challenging. Michael Cobb advises.Continue Reading
What are the Sarbanes-Oxley requirements for social media?
Enterprise social media policies should be sure to meet Sarbanes-Oxley requirements. Expert Mike Chapple explains the specific requirements.Continue Reading
Can encrypted calling apps boost BYOD security?
There are apps available that encrypt voice communications on smartphones and BYO devices, but are they really worth the investment? Expert Michael Cobb discusses.Continue Reading
How can vishing attacks be prevented?
Enterprise threats expert Nick Lewis explains what vishing attacks are and offers best practices for defending against them.Continue Reading
How to avoid brand hacking and ensure enterprise social media security
Enterprise social media has revolutionized how businesses communicate with consumers. However, it has also made brand hacking an even larger concern.Continue Reading