Enterprise mobility management at your own pace: a three-phase approach – InfoWorld

Enterprise mobility management at your own pace: a three-phase approach
InfoWorld
This white paper presents a three-phase plan for mobile empowerment, management and security using the Citrix XenMobile EMM platform. Such a strategy breaks down the process of empowering employees with the benefits of mobility and managing and …

from xenmobile – Google News http://ift.tt/1ra5FBR
via IFTTT

Tagged , , ,

Cybercrime: Top experts to form international crook-hunting force

As many as 18 top cybercrime experts from around the world will form a new Joint Cybercrime Action Task Force based in the Hague, which will target “top-level criminals”.

The post Cybercrime: Top experts to form international crook-hunting force appeared first on We Live Security.

from We Live Security » Languages » English http://ift.tt/1r4Zy1x
via IFTTT

Tagged , , ,

Q2 Malware Storm Wreaks 15 Million New Samples

Panda Security claims 160,000 new pieces of malware were created every day

from http://ift.tt/1tnGXjF
via IFTTT

Tagged , ,

Citrix Is Facing A Very Competitive DAAS And EMM Market Environment (CTXS) – Seeking Alpha (registration)

Citrix Is Facing A Very Competitive DAAS And EMM Market Environment (CTXS)
Seeking Alpha (registration)
They started this process with the introduction of XenMobile in 2013. Citrix is in the early stages of their mobile efforts but mobile will be an important piece of future growth. Along with their mobile efforts, Citrix has XenDesktop and XenApp which

from xenmobile – Google News http://ift.tt/1pu4XQt
via IFTTT

Tagged , , ,

Mobile Security Roundup 1H 2014

The first half of this year has been quite eventful for the mobile threat landscape. Sure, we had an idea the state of affairs from 2013 would continue on to this year, but we didn’t know just to what extent. From ballooning mobile malware/high risk app numbers to vulnerabilities upon vulnerabilities, let’s recap just what […]

Post from: Trendlabs Security Intelligence Blog – by Trend Micro

Mobile Security Roundup 1H 2014

from TrendLabs Security Intelligence Blog http://ift.tt/1rAmuYV
via IFTTT

Tagged , ,

Data breach in South Korea hits 27 million – half the population

A data breach of staggering proportions has hit South Korea – involving 27 million people and 220 million private records – all bought from hackers with the goal of stealing money from online games.

The post Data breach in South Korea hits 27 million – half the population appeared first on We Live Security.

from We Live Security » Languages » English http://ift.tt/1tJHY3p
via IFTTT

Tagged , ,

Cybercriminals Leverage Rumored Windows 9 Developer Preview Release With Social Engineering

We’re seeing schemes that are taking advantage of the buzz around the upcoming developer preview release of Windows™ 9 this September. One of the threats we saw was found using some combinations of keywords like Windows 9, free, leak and download in popular search engines. It involves a potentially malicious website that offers what appears to be a free download of the yet-to-be-released Windows […]

Post from: Trendlabs Security Intelligence Blog – by Trend Micro

Cybercriminals Leverage Rumored Windows 9 Developer Preview Release With Social Engineering

from TrendLabs Security Intelligence Blog http://ift.tt/VQYZvG
via IFTTT

Tagged , ,

New BlackPOS Malware Emerges in the Wild, Targets Retail Accounts

We recently spotted a brand new BlackPOS (point-of-sale) malware detected by Trend Micro as TSPY_MEMLOG.A.  In 2012, the source code of BlackPOS was leaked, enabling other cybercriminals and attackers to enhance its code.  What’s interesting about TSPY_MEMLOG.A is it disguises itself as an installed service of known AV vendor software to avoid being detected and consequently, […]

Post from: Trendlabs Security Intelligence Blog – by Trend Micro

New BlackPOS Malware Emerges in the Wild, Targets Retail Accounts

from TrendLabs Security Intelligence Blog http://ift.tt/1tRuG4I
via IFTTT

Tagged , ,

Banking on Cyber Security Leadership – Banktech

Banking on Cyber Security Leadership
Banktech
Before determining what additional people, processes, and technology are needed for a robust cybersecurity program, banks should look at what they already have in place to protect against potential threats. Most institutions have a team of fraud

from cybersecurity – Google News http://ift.tt/1pThkF0
via IFTTT

Tagged , , ,

Enterprise File Sync & Share Solutions: What’s the Difference? – CMSWire

Enterprise File Sync & Share Solutions: What’s the Difference?
CMSWire
It’s part of our EMM offering XenMobile (which, like ShareFile is a Gartner MQ "Leader" in its respective market) and is integrated with our virtual app/desktop (XenApp / XenDesktop) products, as well as the Citrix Workspace Suite. In fact, we’re the

from xenmobile – Google News http://ift.tt/1pThiNt
via IFTTT

Tagged , , ,
Follow

Get every new post delivered to your Inbox.

Join 1,162 other followers

%d bloggers like this: