It’s essential that everyone in the workforce understand how to keep their mobile phones, laptops, and other endpoint devices secure, writes Chris Hughes.
mobile
Cyber attacks pose financial and reputational risks, which necessitate investment in strong endpoint security defenses.
Robust encryption, access controls, and user education help CISOs mitigate the risks of theft, insider threats, and cyber attacks against their organizations.
Implementation of zero trust security for geographically distributed endpoints is critical in the age of remote work.
There are unique endpoint security challenges associated with cloud-based systems. Here are some strategies to address them.
Tony Uphoff shares a framework for CEOs that will help their companies better connect with customers, stay competitive, and drive growth.
The latest Cutting Edge podcast covers the importance of APIs and what to expect from the so-called API economy in the realm of 5G networks and MEC infrastructure.
New service built specifically for managed security service providers (MSSPs) help them secure the most common mobile devices and encourages self-remediation when issues occur.
Working from anywhere may be popular, but working in an office, at least some of the time, offers important benefits, too, says Tony Uphoff.
In a statement, Lookout exec explains the data collection practices of TikTok and other mobile apps, cites need for awareness of mobile apps’ risk.
The developer of the massively popular game 4 Pics 1 Word is using Couchbase’s mobile sync capabilities to support great user experience and data consistency.
A distributed cloud database architecture enables Couchbase to power a range of customer use cases while delivering quantifiable business impact.
Janet Schijns shares top insights from recent conversations with partners and retailers about how they can best work together.
Lookout Strategy Chief Aaron Cockerill drills into the company’s State of Mobile Phishing Report and says education is a key tactic to reduce the threat.
Annual mobile phishing report from security vendor Lookout has troubling findings about volume, complexity, and impact of phishing attacks. Kieron Allen reviews the findings, and how to respond.
The latest release of cybersecurity vendor Lookout’s mobile phishing report indicates attacks are becoming more expansive — and expensive.
Infrastructure service provider Kyndryl partners with mobility giant Nokia to deliver wireless networking capabilities, apps to enterprise customers.
In the latest episode of The Cutting Edge Podcast, Leonard Lee discusses private cellular networks and their impact on edge computing.
In episode 7, Kieron highlights the need for infrastructure and network support to drive cloud technologies, and cites Nokia’s latest work with 6G as a shining example.
Edge infrastructure’s future evolution is not a myth. There is much overlap between communication technology and telecom technology — and they won’t stay separated without consequences, explains Leonard in Ep. 10 of the Cutting Edge podcast.