News mobile security

How to identify and defend your business’s threat perimeter

Where is Your Threat Perimeter?

As business transform into agile organizations, the traditional perimeters a company could defend against attack have expanded and become less well-defined. In an age where mobile devices, the cloud and the burgeoning IoT revolution, how does security need to change to protect businesses in this new world of fluid data?

data encryption

How Many Mobile Users Have Encryption?

NEWS ANALYSIS: As the rhetoric and the legal motions in the Apple vs. FBI flap heat up, new numbers emerge on the actual status and use of encryption protection