I’ve heard the same story from a multitude of CISOs: “As soon as we agreed to support BYOD and mobile devices, all hell broke loose!” How? All of a sudden there were hundreds or thousands of new ...
The annual RSA Conference, now in its 20th year, will be rocking this month as the security industry gathers in the weeklong extravaganza of product introductions and security experts arguing cloud ...
At a time when every day seems to bring more bad news about cyber security in the context of our nation’s critical infrastructure – foreign invasion of industrial control systems, national election ...
Securing and managing mobile computers is a great way to build and improve your customer relationships. It requires regular contact and interaction with clients and their gear. Because your job is to ...
The majority of companies deploying cloud computing solutions have no cloud-specific security policies and procedures in place and have no measures to approve or evaluate cloud applications that use ...
The current, evolving scenario of utility field conditions and points to what to look for in rugged mobile devices to support computing requirements. The pursuit of aggressive decarbonization goals ...
RA Positions Available! I am looking for highly self-motivated Ph.D. students to conduct research on wireless network security, data privacy, and AI security. If you are interested, please see here ...