Secure communications News
May 07, 2017
Keeping anything safe and secure involves multiple considerations. Avoid putting yourself in danger, put up a protective ‘shield’, detect when that is compromised, take mitigating action. When it ...
March 08, 2017
Brexit means Brexit and BlackBerry means enterprise-level application of the secure communications and mobile productivity platform technologies now that the company's once oh-so-consumer level ...
June 29, 2016
This week, bloggers look at a startup using microsegmentation to create a secure communication channel, FireEye and customized managed network services.
March 09, 2016
MobileIron's new CEO says the goal of enterprise mobility is to transform business processes, but it's hard to support so many different devices.
Secure communications Get Started
Bring yourself up to speed with our introductory content
Exchange certificates typically require minimal management effort after they have been set up, and they offer a secure means of communication between different organizations. Continue Reading
When developing an app, security should be the number one priority. Review these tips for ensuring rock-solid security for your enterprise mobile app. Continue Reading
Secure messaging in healthcare can save providers and patients time and frustration, but the security of PHI should always be the number one priority. Continue Reading
Evaluate Secure communications Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Expert contributor Karen Scarfone examines the best email security gateways to help readers determine which may be best for their organization. Continue Reading
Insufficient email data security remains a gaping cybersecurity concern for the public and private sector, according to the former CIO of U.S. Customs and Border Protection. Continue Reading
Expert Karen Scarfone examines the Check Point Mobile Access Software Blade and explains how it encrypts communications between client computers and enterprise networks. Continue Reading
Manage Secure communications
Learn to apply best practices and optimize your operations.
The SANS Institute's 20 critical security controls all apply to Exchange Server, and many IT organizations are falling behind on many of them. Continue Reading
Enterprises need to ensure session border controllers are up to date to combat the changing landscape of voice attacks. Here are seven questions to ask about SBC security. Continue Reading
With Office 2016, Microsoft introduced a host of new security features ranging from email and file encryption to multifactor authentication for application access. Continue Reading
Problem Solve Secure communications Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
The widespread use of SSH keys is posing security risks for enterprises due to poor tracking and management. Expert Michael Cobb explains how some best practices can regain control over SSH. Continue Reading
If an employee receives invalidated emails, should the corporate email security policy handle it? Expert Matthew Pascucci discusses the rights of the enterprise. Continue Reading
The SWIFT network has increasingly been abused by cybercriminals to carry out bank fraud and theft. Expert Michael Cobb explains possible ways to boost security. Continue Reading