Securing headquarters, data centers, branch offices and mobile users isn’t easy - especially when organizations take a traditional approach toward networking infrastructure using firewalls, VPNs and proxies.
Beyond the glitzy hardware and the mind-blowing specs of your smartphone and tablet, the real factor for determining functionality comes from the apps. Most apps are not out do harmful things, but …
This week, I am attending Aruba Airheads 2014 in Las Vegas. The crowd is buzzing about our integration points, because everyone who sees the demo loves it. More specifically, we have an …
In our last installment on this ongoing series about mobile device security risks, we talked about what could happen once an attacker gains access to the same network that their target is …
Mobile computing changed the selection process for technology at many businesses. Employees started using laptop and mobile platforms based on personal preference rather than choosing from a carefully manicured and vetted list. …
As stated in the previous entry to this series, we discussed that the techniques to discover a plaintext passphrase for a wireless network is done by making a series of educated guesses. The …