You've been researching mobile devices and security for years now but so have the bad guys. Each day, black hat and white hat researchers are finding new security flaws in mobile devices, and not all of them have are widely known. We'll examine five key weaknesses in Android and Apple device…
Security experts and vendors often spur fear and concern by stating that a particular vulnerability is the "weakest link" in enterprise security defense. The problem is that the "weakest link" differs depending on who's talking. This makes life confusing for enterprise security professionals…
Jonathan Feldman 0 Recommendations Eric Green 0 Recommendations Phillip Dunkelberger 0 Recommendations Jason Straight 0 Recommendations Joe Ferrara 0 Recommendations Sean Mason 0 Recommendations Daniel Pfeifle 0 Recommendations Tim Wilson 0 RecommendationsApril 29, 2015 10:30 AM
In this all-day Interop event, the Dark Reading team and a group of top cyber security experts will offer a crash course in what you need to know about data security and the dangers faced by your organization. Please visit the site for more information and event registration.