Who is the weak link in mobile security? This study suggests it's the C-suite
Tech Republic Security
MAY 28, 2020
A survey of IT pros and top execs found that IT is worried about the lax attitude their bosses have toward security.
This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
CIO Business Intelligence
MARCH 10, 2025
The average large enterprise lost $104 million to digital inefficiencies in 2024, driven by productivity losses connected to employee IT frustrations and hundreds of ghost apps flying under the radar, according to a new study. Meanwhile, many enterprise employees turn to unauthorized apps and software to do their jobs, the study says.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Tech Republic Security
JUNE 2, 2020
A Lookout study found that organizations could lose millions through the growing number of unmitigated mobile phishing attacks.
Network World
OCTOBER 18, 2024
Among the fastest-moving frontiers in enterprise cybersecurity: mobile, the internet of things (IoT), and operational technology (OT) systems. of people access the internet with a mobile device, while 59% of internet traffic is generated by mobile devices. Top mobile and IoT/OT targets 5. Today, 96.5%
Network World
MAY 22, 2024
Today’s enterprises need more help managing and securing their distributed networking environments than they ever have, Cisco concludes in its Global Networking Trends Report. Second, is moving more security tools to the cloud to protect the increasingly distributed infrastructure and workforce better.”
Tech Republic Security
JUNE 18, 2020
A study of banking apps for iOS and Android found poor source code protection, cleartext storage of sensitive data, and other serious flaws that make it easy for attackers to break into accounts.
Tech Republic Security
APRIL 18, 2022
Samsung and Oxford Economics study explores how BYOD vs EPD policies can impact SMBs. The post How businesses are reassessing their mobile strategies appeared first on TechRepublic.
Tech Republic Security
SEPTEMBER 7, 2023
New Armis study lists the most vulnerable. Phones, tablets and workstations with unpatched CVEs are a clear and present danger.
Network World
APRIL 23, 2025
With security technologies in particular, networking throughput has long been somewhat constrained as the overhead of inspection and encryption slows things down. CEO Prakash Manas journey to founding Cloudbrink emerged from years of experience at companies like Pulse Secure and Citrix.
CIO Business Intelligence
FEBRUARY 27, 2025
According to a study from Rocket Software and Foundry , 76% of IT decision-makers say challenges around accessing mainframe data and contextual metadata are a barrier to mainframe data usage, while 64% view integrating mainframe data with cloud data sources as the primary challenge.
CIO Business Intelligence
JANUARY 27, 2025
According to the Foundry Cloud Computing Study 2024 , 63% of enterprise CIOs were accelerating their cloud migrations, up from 57% in 2023. When organizations migrate applications to the cloud, they expect to see significant benefits: increased scalability, stronger security and accelerated adoption of new technologies.
Network World
JULY 30, 2024
That’s according to IBM’s 2024 Cost of a Data Breach Report that analyzed data infringements included interviews with 3,556 security and business professionals that hit 604 global organizations, between March 2023 and February 2024. million—among the 16 countries and regions studied. Taken together, these costs totaled USD 2.8
CIO Business Intelligence
OCTOBER 24, 2024
Device spending, which will be more than double the size of data center spending, will largely be driven by replacements for the laptops, mobile phones, tablets and other hardware purchased during the work-from-home, study-from-home, entertain-at-home era of 2020 and 2021, Lovelock says.
CIO Business Intelligence
OCTOBER 17, 2024
Some studies tout major productivity increases , while others dispute those results. The future is now Even with some issues to work out, and some resistance from developers to AI coding assistants, AI-native coding is the future, says Drew Dennison, CTO of code security startup Semgrep. Gen AI tools are advancing quickly, he says.
CIO Business Intelligence
MARCH 26, 2025
During COVID-19, the organization immediately moved from desktop-based work to remote & mobile- based setup, a difficult shift entirely done under the leadership of CIO. We seek partners who invest in data security, compliance, and long-term innovation.
Network World
JUNE 25, 2017
At the IEEE Symposium on Security and Privacy 2017, researchers from the College of Management Academic Studies in Israel presented an interesting paper on bad password reset processes, “The Password Reset MitM Attack” ( pdf ). They dubbed the attack: password reset man-in-the-middle (PRMitM).
CIO Business Intelligence
JULY 22, 2024
Ninety percent of customers do not, according to one 2024 study , but 78% said they’d be more likely to share their data with a company they trust. An unencrypted or unlocked mobile device gets lost or stolen. But as organizations collect more data, should customers trust them with their information?
CTOvision
FEBRUARY 4, 2014
By Bob Gourley We often highlight the importance of applying security controls to your enterprise. As a review, they are: 20 Critical Security Controls – Version 4.1. Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers. Application Software Security.
CTOvision
APRIL 28, 2014
For a decade now the cyber security community has been treated to important strategic context coordinated by Verizon in their Data Breach Investigations Report (DBIR). 92% of attacks studied in this research can be described and categorized by nine basic attack patterns of: Crimeware. By Bob Gourley. Insider Misuse. Cyber Espionage.
CTOvision
APRIL 8, 2014
A report by the CTIA maintains that the ability to activate the Kill Switch could not be secure, because so many phone service providers would have that power. He recently published a study analyzing public opinion toward the Kill Switch. billions dollars per year – based on estimates of annual spending on stolen phones.
CIO Business Intelligence
JULY 20, 2023
Since then, automation has filled the gap in improving customer experience and security. Customer experience and security But as in most industries, customer expectations and security challenges continue to grow along with technological advances. Security and privacy.
CIO Business Intelligence
MAY 31, 2022
In an age where every brand is considered a digital brand because the customer’s main touchpoint is a mobile application, the CIO is the head of product and Chief Marketing Officer at the same time. More interestingly is how brand perception changes after consumers encounter an error on your mobile platform. First, errors are common.
GeekWire
FEBRUARY 11, 2025
The Allen Institute for AI (Ai2) released its first on-device AI app Tuesday morning, leveraging a version of its open-source OLMoE model that can run offline on Apple iOS devices, promising new levels of security and privacy. ” OLMoE on iPhone.
CTOvision
JUNE 7, 2014
If you are a technologist you no doubt have thoughts about security and how to improve your approach to enterprise-wide defense. In this educational presentation, CTOvision’s Bob Gourley will provide actionable information that will help you review your security architecture and enhance your level of automation. By Bob Gourley.
CIO Business Intelligence
MARCH 17, 2025
But you also need to manage spend, reduce duplication of effort, ensure interoperability where necessary, promote standards and reuse, reduce risk, maintain security and privacy, and manage all the key attributes that instill trust in AI. Todays challenge is perhaps far greater.
Network World
SEPTEMBER 16, 2024
And in the security arena, Cisco is building out its platform-based approach to enterprise security with elements such as its new Hypershield AI-native architecture. Cisco snaps up AI security player Robust Intelligence Aug. Cisco to cut 7% of workforce, restructure product groups Aug.
Network World
JULY 19, 2016
IT decision-makers who have responsibility for security believe security teams are brought in too late to have a meaningful effect on digital transformation initiatives, according to a new study. Germany, Australia, Scandinavia and the Benelux region. To read this article in full or to leave a comment, please click here
Network World
FEBRUARY 10, 2017
We continue to hear dire warnings about the inherent security risks of the Internet of Things (IoT), and indeed IoT-related incidents are happening. With many companies beginning to capture IoT data from connected devices, a key question is are they doing enough to ensure that data and networks are secure?
CIO Business Intelligence
AUGUST 5, 2024
Women drive equality in conversations One interesting study found that in working groups of two to five individuals, groups that had more women usually had more “equality in distribution of conversational turn-taking.” CIOs can be catalysts for innovation as well as trusted partners in their organization’s overall success and security.”
CTOvision
DECEMBER 15, 2014
We also believe their questions hold in them indicators of potential future government demand, making them worth study by by the technology community. Mobile and embedded Agile environments – Proliferation of new device types, form factors, firmware and OS versions, and native hardware all present new complications for testers.
CTOvision
APRIL 19, 2014
Friends at the Potomac Institute for Policy Studies recently brought this to our attention and since a high number of our readers live their lives studying or working with advanced technologies we wanted to get this to you right away. Mobile - This revolution is empowering the workforce in ways few of us ever dreamed of.
CTOvision
DECEMBER 30, 2014
New security needs and capabilities. We also provide a library of white papers and studies curated for the enterprise technology consumer. Cyber Security. You can accelerate your market research into available technologies by reviewing our actionable information and context in these categories: Analytical Tools. Cloud Computing.
CTOvision
AUGUST 16, 2014
These reports provide actionable information and context on topics like Analytical Tools , Big Data , Cloud Computing, Comms , GreenIT , Infrastructure , Mobile , Security , Visualization , As a technology creator, we would also like to ensure we are tracking what you are doing so we can report relevant info for our readership.
CIO Business Intelligence
MARCH 12, 2025
But even the IT environments of companies in less complex industries often now resemble a conglomeration of local data centers, virtual machines, mobile devices and cloud services. This is simply because each cloud platform works with its own management tools, security protocols and performance metrics.
CIO Business Intelligence
JULY 5, 2023
Improving employee productivity and collaboration is this year’s top digital objective among IT leaders, according to Foundry’s 2023 Digital Business study. Roche, a global pharmaceuticals and diagnostics enterprise, uses Chrome Enterprise to help keep its data secure, while ensuring employee productivity.
CIO Business Intelligence
MARCH 18, 2024
Exposure to new technologies such as trackers, robots, and AI software in the workplace work is linked with lower quality of life for workers, a UK study has found. Commenting on the research, several IT experts pointed to a problem, not with the new technologies themselves, but with the training and enterprise culture around them.
CIO Business Intelligence
MAY 19, 2022
In fact, Mastercard sponsored an Oxford University study of consumer sentiment that discovered just that. According to a 2021 survey from Transmit Security , 71% of Gen Zers can’t identify phishing attempts or describe how they work. For this generation, 2FA is more of a friction-inducing obstacle than a welcome security measure.
CIO Business Intelligence
OCTOBER 9, 2022
Migrate to the cloud, strengthen security, protect privacy, increase agility, advance automation, improve sustainability, optimise the budget … “explore the metaverse” is certainly on the to-do list for most CIOs, along with many, many other competing priorities. This will all be fixed, probably a lot faster than most of us expect.
CIO Business Intelligence
AUGUST 29, 2024
Then there are the potential security vulnerabilities that go hand-in-hand with frequent lockouts, password resets, and re-verifications. A Forrester study found that companies spend $87 per password reset (adjusted for inflation in 2024), which amounts to a whopping $795 per employee annually. Where do these costs come from?
CIO Business Intelligence
SEPTEMBER 12, 2023
That’s because the 5G technology powering your phone remains intact, giving you a reassuring sense of security and an open line of communication with weather updates, friends and family during the storm. Bolster security and gate user access Across all industries, bolstering security is of increasing importance. Here’s why.
CTOvision
FEBRUARY 12, 2014
By Ryan Fahey There are many reasons to study tech trends, but one that really hits home is to consider the impact trends may have on your career. Lenzner is a thought-leader in the enterprise security, technology risk, privacy, and compliance arenas. Mobility, cloud, and BYO will dominate the technology and global marketplace.
CTOvision
SEPTEMBER 10, 2015
Security has quickly transformed into a major issue for most businesses. Of course, it’s easy to say that security problems need to be addressed quickly. One of the biggest obstacles is figuring out who should spearhead the effort not just to improve security but ensure no attackers infiltrate in the future.
CIO Business Intelligence
MAY 17, 2022
With a thoughtful, well-planned passwordless deployment, organizations can build security and privacy into streamlined customer experiences. As organizations increasingly adopt cloud-based technologies, they need to incorporate solutions that protect the security and privacy of sensitive data.
CTOvision
MAY 22, 2014
Organizations are giving more priority to development of information security policies, as protecting their assets is one of the prominent things that needs to be considered. So an organization makes different strategies in implementing a security policy successfully. Security policies are tailored to the specific mission goals.
Expert insights. Personalized for you.
We have resent the email to
Are you sure you want to cancel your subscriptions?
Let's personalize your content