ResearchSecurity battles escalate
The extent of the ongoing IT security threat continues to expand in form, scale, and response. While both threats and responses are becoming more sophisticated, so far the threats appear to… Read more »
{"source":"http:\/\/search.gigaom.com\/technology\/malware\/wijax\/383af13036138b805db0da550b1f5914?authors=cap-laurastuart","varname":"wijax_23500eb7eea90c36e5523d6670fc6abc","title_element":"h2","title_class":"widget-title","title_before":"%3Ch2%20class%3D%22widget-title%22%3E","title_after":"%3C%2Fh2%3E"}
Alerts notify you of new stories or reports as soon as they are published. They are delivered via email and can be customized by topic and frequency.
Keep an eye on the future, by getting new results in your inbox.
Use the filters below to edit your Alert.
The extent of the ongoing IT security threat continues to expand in form, scale, and response. While both threats and responses are becoming more sophisticated, so far the threats appear to… Read more »
Most businesses recognize that mobile computing, particularly with the prevalence of BYOD, is a major security threat, as detailed in the recent Gigaom Research report, Managing mobile risk: threat management and… Read more »