YOU ARE AT:TagsSecurity

BROWSING: Security

HP Discover 2012: HP’s strategy focuses on cohesion

LAS VEGAS - Like most large multi-nationals, Hewlett-Packard (NYSE: HPQ) can be challenged to orchestrate its different verticals, which ranges from business-focused products to end user-user focused personal devices. Distilling the range of objectives can even be complicated to digest, even for HP's employees –...

HP Discover 2012: CEO Meg Whitman reinforces infrastructure as HP’s foundation

LAS VEGAS—After HP's turbulent year in 2011, with Léo Apotheker stepping down as CEO just 11 months after being named and the indecision over the future of its PC business, HP (NYSE: HPQ) used this week's HP Discover 2012 event to make its enterprise business strategies...

Reality Check: BYOD demands mobile security improvements

Two big IT events happened in Las Vegas last month: Interop and Symantec Vision. Both events made a very good impression on me when I downloaded the apps and found out I could do my check-in,

Reality Check: Learning from security analytics

Within a couple of years, the exploitation of various infection techniques will make malware as problematic on mobile devices as it is on PCs – and because mobile operators are also subject to Windows-based

Feature report: Ready for the cloud, increased mobile and IT consumerization?

Increased mobility, cloud computing, and IT consumerization are the main enterprise trends that companies around the world are basing their strategies on. RCR Wireless News is watching these trends to learn how they are affecting companies and impacting chief information officers (CIOs). Vendors, consulting firms,...

Security market up with rise in mobile tech attacks

Increases in the sales of PCs, laptops, and especially smartphones are spurring growth in the security market. A report from Symantec Corp. shows that while the number of vulnerabilities decreased by 20% last year compared to 2010, the number of malicious attacks continued to...

Asia-Pacific, Latin America to lead cloud computing adoption; U.S., Europe remain cautious

Cloud computing apps are set to become much more popular by 2014, with Latin America and Asia-Pacific leading the way. Currently, large companies in emerging markets are the most aggressive adopters of cloud computing, while their European and U.S. counterparts remain more conservative about...

Reality Check: Protecting the mobile network and devices

Despite the increases in today’s mobile malware, many mobile operators and subscribers continue to be virtually blind to the full extent of the problem – they simply react to incidents as they occur and

Technology individualization complicates corporate IT environment

IT consumerization and the bring-your-own-device (BYOD) trend are changing companies and as consequence, their IT departments. If a couple of years ago, a company's chief information officer (CIO) was “the man” who decided all, current employees – and many high-level executives – are now...

ARM, Gemalto and Giesecke & Devrient form mobile security JV

Eyeing the growing range of connected devices, ARM, Gemalto and Giesecke & Devrient have created a joint venture focused on delivering a secure and accessible environment for advanced services running on platforms such as tablets, smart-TVs, games consoles and smartphones. All three companies will contribute...

Gartner VP: CIOs have to ‘learn to lose control a little’ over BYOD

When it comes to bring-your-own-device (BYOD) policies, chief information officers (CIOs) tend to become resistant, mostly because of management and security issues. BYOD is a trend which sooner or later will catch up with many companies, so IT managers must become more open to...

Changing telecom industry’s new challenges: monetization, security and becoming “smart pipe”

What the telecom industry has not changed in the past ten years, it is changing now – and in a drastic way. The advent of new technologies, such as mobile broadband, voice over IP (VoIP) and messaging, among others, have contributed to the shift....

Phone loss on the rise, police chiefs ask FCC to help

If you've made it through a year without losing your phone, you're beating the odds. That's according to statistics from the mobile security experts at Lookout, who say their phone-finding app locates a lost or stolen phone every 3.5 seconds. Lookout surveyed its 15...

Reality Check: Why Is Android vulnerable

Android devices are clearly the target of mobile malware with a 400% increase in Android infections in the latter part of 2011. So why is the Android platform so vulnerable?

MWC 2012: Radware stresses security and optimization

Due to the phenomenon of more and more data and video traveling over telecom networks, operators need to protect and optimize their data services, noted Radware's (RDWR) David Aviv during a conversation with RCR Wireless News. Aviv noted that the company is focusing at...

NEC acquires Argentinean security company

NEC has acquired an 85% stake of Global View, an Argentinean company that provides video surveillance services. Following closing of the transaction, Global View will operate as a subsidiary of NEC Latin America. Global View does a lot of work with municipal governments, with a...

Mobile devices create challenges for enterprise security

A recent report of security company  Check Point Software Technologies Ltd. (CHKP), named The Impact of Mobile Devices on Information Security, showed 71% of businesses believe mobile devices have caused an increase in security incidents, citing significant concerns about the loss and privacy of sensitive...

Breaking down sources of cyber crimes

Eugene Kaspersky seems to be a different CEO – at least less formal than top executives normally are. He graduated from the Institute of Cryptography, Telecommunications and Computer Science in 1987, and in 1997 co-founded the developer secure content and threat management solutions company...

Reader Forum: 10 virtualization and cloud computing predictions for 2012

Editor’s Note: Welcome to our weekly Reader Forum section. In an attempt to broaden our interaction with our readers, we have created this forum for those with something meaningful to say to the wireless industry. We want to keep this as open as possible, but we...

2012 Predictions: Mobile security threats

During the last two years we’ve seen an increase in attacks on smartphones and mobile devices. We’ve run across rootkits, botnets and other malware. Attackers have moved on from simple destructive malware to spyware and malware that makes them money.

Reader Forum: Hackers and new forms to maliciously explore DNS

Editor’s Note: Welcome to our weekly Reader Forum section. In an attempt to broaden our interaction with our readers, we have created this forum for those with something meaningful to say to the wireless industry. We want to keep this as open as possible, but...

CIOs watching for 3 top IT trends

Chief information officers are looking forward to three main trends that will (and in several cases already are) challenging their own corporate strategies: consumerization, cloud computing, and mobile security and management. Pressured by chief financial officers to reduce the total cost of ownership and...

Smartphones lack security solutions

Though most people know the importance of protecting their phones, research conducted by security vendor Eset showed that 80% of smartphone users do not have a security solution, or even consider it necessary. "We see an increase in the attacks against mobile platform, especially...

Reader Forum: Are Apple products really more secure?

Editor’s Note: Welcome to our weekly Reader Forum section. In an attempt to broaden our interaction with our readers we have created this forum for those with something meaningful to say to the wireless industry. We want to keep this as open as possible, but...