Mobile

  • OAuth: Your Guide to Industry Authorization

    Nearly a decade ago, the cyber industry was toiling over how to enable access for users between applications and grant access to specific information about the user for authentication and authorization purposes. Enter authorization-focused OAuth 2.0 and authentication-focused OpenID Connect (OIDC). In the last decade, organizations adopted OAuth and its companion OIDC to enable customers…


  • Best Kaspersky Alternatives

    Kaspersky makes very good endpoint security software, one of just four companies to make both our top endpoint detection and response (EDR) and best antivirus software product lists. But the Moscow-based company has faced allegations that it has been compromised by the Russian Federal Security Service (FSB). Those allegations remain unproven, and Kaspersky has gone…


  • Mobile & Smartphone Security Threats

      Mobile communications are an increasingly integral part of their everyday lives for people at work and at play. But as mobile access has grown, so have mobile security threats. Such threats are lucrative for hackers and frustrating for companies trying to thwart their attacks. Here are the 10 top mobile security threats, as suggested…


  • Types of Mobile Malware & Solutions

    As users have increasingly moved from desktop operating systems to mobile devices as their primary form of computing, cyber attackers have taken notice and malware has followed. While the total volume of mobile malware is a fraction of that created for desktops, it is nonetheless a growing security concern, as more and more high-value and…


  • What is Mobile Device Management (MDM)?

    The era of employees bringing their own devices into corporate environments created the need for advanced technology platforms to help control all types of devices. Bring Your Own Device, often shortened to BYOD, opens up organizations to new risks and creates a need for a new type of device control. What is MDM? Mobile Device Management, or…


  • Ultimate Guide to BYOD Security

    A core element of computing access is end users and their devices. It is the device that will access a network or corporate application and it is often the device that represents the “last mile” of security for any organization. To understand device security, it’s critical to have some measure of control and management over…


  • Enterprise Mobility Management Guide

    The modern enterprise is mobile and employees are no longer tethered to their corporate owned and provisioned computing equipment. As is the case in the wired world, mobile end-user devices need to be managed to improve employee productivity and to reduce enterprise security risks. That’s the world that Enterprise Mobility Management (EMM) inhabits. What is…


  • What is a Cloud Access Security Broker (CASB)?

    What is a CASB? A CASB provides enterprises with a critical control point for the secure use of cloud services across multiple cloud providers. Software as a service (SaaS) apps are becoming pervasive in enterprises, which exacerbates the frustration of security teams looking for visibility and control of those apps. CASB sales have soared as…


  • 5 Tips on Using OAuth 2.0 for Secure Authorization

    By Aleksey Gavrilenko, Itransition Approaches to security issues change constantly, along with evolving threats. One approach is to implement OAuth, an open authorization standard that provides secure access to server resources. OAuth is a broad topic with hundreds of articles covering dozens of its aspects. This particular article will help you create a secure authorization…


  • Best iPhone Security Apps

    While Apple blocks full anti-virus apps from its App Store, counting on its own technology and systems to protect its users (in a whitepaper [PDF], the company states, “Every iOS device combines software, hardware and services designed to work together for maximum security and a transparent user experience”), there are several key steps worth taking…


Top Cybersecurity Companies

Get the Free Newsletter!

Subscribe to Cybersecurity Insider for top news, trends & analysis