

Galen Gruman
Executive Editor for Global Content
Galen Gruman is executive editor for global content at IDG Foundry Co.’s enterprise sites, currently focused on our non-English-language properties.

Australia updates its security advice for iOS and Samsung mobile devices
Apple’s iOS provides the greatest security for sensitive and classified information, but business-class Samsung Android devices can be configured for secure use as well.

How Singapore security professionals responded to the COVID-19 crisis
Although Singaporean security trends generally tracked with other Asia-Pacific countries, Singapore's focus on digital services did lead to some key differences.

How Australian IT security pros responded to the COVID-19 crisis
Australian organisations fared better than their Asia-Pacific and global peers in many indicators, but Aussies also have lower expectations for IT and security investments, a survey finds.

How Australian, NZ firms have pivoted to address cyber security threats
Firms have made cyber security more strategic, but struggle to identify the key actual threats in a changing landscape

In scathing ruling, judge says Apple can't be forced to unlock iPhones
The government's legal position would lead to 'absurd' results and be unconstitutional if accepted, a federal judge rules

FBI, keep out! How to encrypt everything
Encryption is a vital self-defense tool, so here's how to enable it on all your devices and computers running the major OSes
iOS 9 breaks VPNs, prevents server access for many
Cisco AnyConnect and other VPNs may or may not work for your servers, as Apple breaks split-tunnel compatibility

Mobile security: iOS 8 vs. Android 5 vs. BlackBerry vs. Windows Phone
Google's Android for Work and Samsung's Knox promise serious security, but how does they stack up against Apple's iOS and the rest?
Wireless Security: The Basics
Encryption and authentication are the fundamentals of wireless security - here's your guide.
How To Protect Your Mobile Data
Encrypt data that leaves the office? Yes. The best way to do it? It depends. Here's how to develop a strategy for your organization seeking to secure data on those roaming, mobile devices.