Novotel Convention & Spa Antananarivo Hotel has implemented smart locks with digital key and mobile access, along with contactless check-in for convenience and safety.
Rapid 7 has disclosed a set of address bar spoofing vulnerabilities that affect a number of mobile browsers, ranging from the more common browsers, like Apple Safari and Opera Touch, to the less common, like Bolt Browser and RITS Browser. The announcement is a coordinated vulnerability disclosure publication with security researcher, Rafay Baloch.
United Airlines launched a new chat function – the United Automated Assistant – to give customers a contactless option to receive immediate access to information about cleaning and safety procedures put in place due to COVID-19.
For many people, their mobile device, serves as their primary computer in day-to-day life. Modern mobile devices offer a rich, flexible set of features and allow users to add new features just by downloading applications.
Compromises of mobile devices can be just as damaging. They have the potential to undermine an organization's customer data, intellectual property and more. How can enterprises take on persistent mobile security threats?
In a world where devices of all types are connected to networks, the need to maintain strong cybersecurity is greater than ever. For organizations, particularly those that retain financial and other sensitive company and customer data, cybersecurity is critical, as the results of a network breach could be catastrophic.
Security organizations may be late adopters of technology to manage their workforces, but once implemented, the early benefits of technological solutions become quite clear to them. They’re waking up to understand that simply placing a security officer at a post is no longer a viable option.
NIST’s National Cybersecurity Center of Excellence is seeking industry comments on its newly released draft guidance for corporate-owned personally enabled (COPE) mobile devices.
Mobile device management (MDM) is a proven, cost-effective solution to meet an organization’s needs for security and control. However, as organizations scale up, or need to manage risk or stay compliant, they also need to manage costs. A company’s smartphones, tablets, laptops, and other connected devices—and the apps and data plans associated with those devices—are expenses, which can quickly escalate.