April 06, 2018
Asset tracking is arguably the lowest-hanging use case that enterprises can consider in testing the potential of the internet of things (IoT). From airport operators to mining companies, the use of ...
December 24, 2017
Christmas has always been a time of heightened security against current and potential subversives - even in the womb.
November 30, 2016
The Louisiana Department of Health responded to flooding with the help of GIS software that located trouble spots with at-risk hospitals. Ease of use was welcome, according to a preparedness manager.
September 13, 2016
Aruba is drawing together six network product offerings to create a new mobile first platform underpinned by APIs.
GPS Get Started
Bring yourself up to speed with our introductory content
Roambee's Sanjay Sharma explains why taking a connected things approach to fleet management -- versus a connected fleet approach -- helps better track the health of shipments. Continue Reading
The failure to detect insider threats and a growing need to store and sort through massive amounts of data have drawn attention to user behavior analytics, sometimes called user and entity behavior analytics. According to Gartner, UBA tools deliver value for use cases such as compromised accounts, including stolen and phished credentials. They can also be used to find compromised systems and data exfiltration.
Security platforms like data loss prevention, endpoint security and cloud access security brokers will increasingly layer or incorporate UBA features to help analyze alerts and make underlying technology more useful, according to analysts. SIEM and UBA are also converging, with SIEM vendors adding UBA tools and UBA vendors building SIEM systems.
In this issue of Information Security magazine, we look at the dynamics around UBA and strategies for CISOs going forward. UBA vendors are releasing product suites targeted at security operations centers, today built around SIEM. What does the future hold for standalone UBA tools? We look at time to value and use cases, and help you sift through the noise.Continue Reading
Skyhook's Kipp Jones offers advice on defining your requirements for location in IoT and questions to get the best technology from your location service provider. Continue Reading
Evaluate GPS Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Wearable devices aren't just a consumer fad -- they're making inroads in the enterprise, improving worker safety and resiliency, says Borqs Technologies' George Thangadurai. Continue Reading
IoT will drive employee productivity and improve customer interaction. Mindtree's Srinivas Bhagavatula discusses the benefits and challenges of using location sensing in the enterprise. Continue Reading
The exchange of ideas, expertise and data among people, organizations and governments could enable the corporate world to create more sustainable products and services. Continue Reading
Learn to apply best practices and optimize your operations.
Information security technologies embrace user behavior analytics, and the trend is expected to continue. Should CISOs consider a standalone UBA component? Continue Reading
GPS has been extraordinarily reliable, but there's a growing chorus of experts who say it's time to assess GPS security and consider protective strategies. Continue Reading
Among a range of new and interesting features, Fall Creators Update finds Surface Pen is one of my favorites. Here's a demo. Continue Reading
Problem Solve GPS Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Spyware was found on infected Android apps, which were meant to convey embassy information and news, in the Google Play Store. Expert Michael Cobb explains how the spyware works. Continue Reading
Attackers can use accelerometer tracking on mobile devices as an eavesdropping tool. Here are some ways to reduce the threat to your device. Continue Reading
Motion and gestures are being used for mobile malware detection on smartphones. Learn how this method works and whether it is a worthy addition to an enterprise security strategy. Continue Reading