The world’s top companies use wandera Learn Why Try Wandera for Free


Biometric data: a few reasons why it hasn’t replaced passwords yet

1400 933 Liarna La Porta

In part 1, we covered the brilliance of biometrics including increased security and convenience. There’s a lot of biometric data out there already and loads of research in this area making it more of a…

read more

CIA mobile hacks released by WikiLeaks: should you be worried?

1051 760 Joel Windels

A vast portion of the CIA’s computer hacking arsenal was exposed on Tuesday by WikiLeaks. The anti-secrecy organization posted thousands of files revealing known exploits and device vulnerabilities used by the CIA to convert devices…

read more

5 reasons why large companies buy software from small vendors

3000 1888 Liarna La Porta

Less than fours years after our first sale, we’re hugely impressed with the number and caliber of big enterprise customers that have adopted our solution. These include some of the world’s biggest financial, professional, technology…

read more

So little time, so many mobile app leaks

3800 2533 Liarna La Porta

People rely on apps for almost everything – from social networking, to work, to navigation – resulting in a huge demand for service providers to have an app available to customers. Why are there still…

read more

1 in 10 people falling victim to online fraud and cybercrime

1200 800 Liarna La Porta

Let’s face it, we live in an online world now. Avoiding crime is no longer a matter of positioning yourself away from risky locations, holding more tightly onto your wallet or locking your doors. Anyone,…

read more

Biometrics is reshaping the future of authentication, but do you trust it?

1600 1000 David Renwick

Are we are ready to start moving towards biometrics as a viable alternative to the good old trusty username and password? It’s an interesting area to look at for lots of reasons. For us at…

read more

Is your organization at risk of laziness?

1580 1171 Joel Windels

Humans and electricity have something in common. They’re both inherently lazy, at least in some ways. Security for example. People, just like electric currents, will always seek to take the path of least resistance. If…

read more

IT cloud adoption explained in four graphs

2449 2449 Joel Windels

It’s almost impossible to browse through a software vendor’s website without coming across the same phrases and words. Cloud is one of those terms (you can find it right here on our site), but shows…

read more

Mobile internet usage surpasses desktop for the first time

1800 1200 David Renwick

A recent report states mobile internet usage has surpassed desktop for the first time. Many of us thought this happened some time ago, but regardless, the evidence is clear – we love our mobile phones.…

read more