Feeds

Security threats for mobile users

How to find them and stop them

  • alert
  • submit to reddit

Internet Security Threat Report 2014

On Demand If you've got security in your remit and an increasingly mobile work force then we could have just the tonic for your day job, a webcast discussing just these challenges.

Our old friend Jon Collins, from Freeform Dynamics, is fronting the affair and he's joined by Ian Moyse from Webroot. The pair of them rattle through some state of the market info - like the fact that four out of five threats nowdays are coming from the web, rather than email, and the shape and scale of these threats.

They have a debate around the quality of tools and services available today and whether they're actually keeping pace with the demands of mobile users and the increasing levels of sophistication being employed by the bad guys. This is followed by an exploration of the new wave of emerging SaaS security solutions and whether these might be more useful for today's deployments.

It all makes for an interesting affair and, for just 30 minutes of your time, promises to educate you in the changing face of web threats. Can you afford to miss it? We thought not, you can watch it right here for free. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
Musicians sue UK.gov over 'zero pay' copyright fix
Everyone else in Europe compensates us - why can't you?
Megaupload overlord Kim Dotcom: The US HAS RADICALISED ME!
Now my lawyers have bailed 'cos I'm 'OFFICIALLY' BROKE
MI6 oversight report on Lee Rigby murder: US web giants offer 'safe haven for TERRORISM'
PM urged to 'prioritise issue' after Facebook hindsight find
BT said to have pulled patent-infringing boxes from DSL network
Take your license demand and stick it in your ASSIA
Right to be forgotten should apply to Google.com too: EU
And hey - no need to tell the website you've de-listed. That'll make it easier ...
prev story

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.