Election security - or rather, the lack of it - is suddenly a hot topic on Capitol Hill and elsewhere.
BlackBerry continues to impress on product and execution, but it is held back by an image tied to what it used to be. Customers have clearly indicated that BlackBerry is keeping their firms and people far safer than what is likely being deployed by competitors.
We need to rethink security as a competitive edge and stop thinking of it as an impediment to getting business done.
The same tools being used to augment the development and operations side of the house can also be applied to automation in security.
In some cases, mobile application management functionality is delivered in standalone MAM platforms. In others, it comes as a module in a broader suite of services. In either case, the tasks MAM performs are vital.
Mobile application management (MAM) focuses on supporting what is sent to and resides on the mobile device. Enterprises rely on MAM for a balance of security and functionality.
5G will likely be a powerful asset to business operations, but is your security going to be able to keep up with it?
Blockchain will transform the supply chain in 2019.
What do experts think will happen in 2019 when it comes to data privacy?
Watch to see if strategic acquisitions and enterprise turning to open source to address security ends up as a trend in 2019.
The largest share of the focus of mobility during the past decade has been on technical issues. How can IT departments securely support an increasingly mobile and dispersed enterprise work force?
Not all of the cybersecurity predictions surrounding AI and ML are positive.
The most important thing to remember about any of these predictions is the ability to prepare for and defend against potential cyberattacks.
Mobile device management (MDM) is a major element of the fight to secure devices and there are many ambitious options in the MDM sector.
AI platforms will certainly allow the enterprise to elevate its game against the underworld, but the reverse is true as well.
Unless the largest organizations are forced to comply and meet the standards of these regulations, we are going to see bigger and more devastating data breaches because there is no incentive to stop them.
The popularity and reliance on IoT has been trending upward for quite some time now, but despite the dire warnings and the raised awareness about targeted attacks, IoT security has flatlined.
In terms of 2018 security and compliance trends, AI and ML are generating buzz, but the jury is out on how (or if) they can be most effectively used.
Deep learning in general, done right, is a game changer, and products that use this AI approach have a high probability of being massively better than their more traditional competitors.
Cloud security trends are front and center this year, and they are shifting in new ways. We depend on cloud services more than ever, and you know wherever the users and the data are, the hackers will follow.