Detecting cyber attacks in a mobile and BYOD organization
Help Net Security
Explore the challenges, understand needs and evaluate mobile device management as an approach to detecting attacks. It can lead to a flexible, highly efficient solution that detects all phases of an active attack on mobile devices, regardless of device type, operating system or applications installed.
Moving targets: Brad Howarth speakers to the IT professionals monitoring a mobile threat landscape
Ecuador citizens’ data breach holds lessons for enterprises
Marketing analytics company leaks deep profiles of entire Ecuador population