Get a Pentest and security assessment of your IT network.

Cyber Security

Post-Perimeter Security: Addressing Evolving Mobile Enterprise Threats

In the era of the cloud, enterprises house sensitive corporate data outside of the traditional perimeter. Employees can access this from any endpoint, including mobile devices, and from any network. This presents a host of new challenges for companies looking to protect their sensitive information. Gartner’s Patrick Hevesi, Lookout’s David Richardson, Google/Android s Mike Burr talk about practical strategies for locking down this work-from-anywhere environment. Q&A covers user awareness, two-factor authentication, APT threats, mobile VPNs and more.

Source: https://threatpost.com/post-perimeter-security-mobile-enterprise/142880/

Related posts
Cyber Security

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

Cyber Security

Art of Twitter account hacking

Cyber Security

Alexa Eavesdropping Flub Re-Sparks Voice Assistant Privacy Debate

Cyber Security

Dan Geer, Richard Thieme on specialization in security