As 2012 comes to a close, it's time to reflect on the security trends of the year with this look at the hottest security slideshows of 2012. As the holidays approach and 2012 draws to a close, it’s time to reflect on some of the most popular security slideshows of the year. Here are the 12 most-viewed security slideshows of 2012. 1. 10 Mobile Device Management Apps to Take Charge of BYODManaging devices in a BYOD environment is no mean feat, and the right mobile device management (MDM) product can be a key component in making it work. Here are 10 leading MDM products on the market today. 2. 12 Scams of Christmas and How to Avoid Them ‘Tis the season for online scams. Here are 12 of the most dangerous scams you’re likely to see this holiday season. SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe 3. Anonymous, LulzSec, AntiSec, Etc.: A Brief History of HacktivismThe hacktivist collective Anonymous began getting media attention in 2008 with its attacks on the Church of Scientology. Three years later, Anonymous and its many offshoots and associations, including LulzSec, AntiSec, TeamPoison and the Peoples Liberation Front, reached the pinnacle of their infamy with major attacks on powerful corporations and government agencies. Here, CIO.com presents in pictures an abridged (and admittedly U.S.-centric) timeline of hacktivist activity. 4. The Most Mortifying Moments in IT Security History From Lockheed Martin and HBGary Federal to the U.S. government and Cornell University, no one is immune to humiliating security glitches. 5. 20 Security and Privacy Apps for Androids and iPhonesEncrypted storage, malware scanners, missing-phone-finders and more: Here are 20 apps to help protect your smartphone, your privacy and your data. 6. 13 Security MythsSecurity experts hammer on security ideas they say are just “myths.” 7. What’s Hot at RSA 2012Here are highlights from RSA Conference 2012. 8. Rogues Gallery: 9 Infamous Social EngineersSocial engineers, or “human hackers,” have been duping victims from the very beginning of human existence. Here are nine infamous con artists who made history with their scams and schemes. 9. 10 Fun (and Safe) Ways to Pretend to be a HackerEnjoy hacking, Hollywood-style, with these video games. 10. Hackers in the Limelight: Scenes From Black Hat 2012The annual security fest featured thrills and chills as the pros did their best to make everyone feel afraid. 11. Who Holds IT Security Power?From Apple, to Symantec and Anonymous, lots of people, companies and groups influence the IT security world. 12. Tablets With Serious Security for BusinessThese tablets have extra security features that will keep your work safe and your IT pros happy. Thor Olavsrud covers IT Security, Big Data, Open Source, Microsoft Tools and Servers for CIO.com. Follow Thor on Twitter @ThorOlavsrud. Follow everything from CIO.com on Twitter @CIOonline and on Facebook. Email Thor at tolavsrud@cio.com Related content brandpost Should finance organizations bank on Generative AI? Finance and banking organizations are looking at generative AI to support employees and customers across a range of text and numerically-based use cases. By Jay Limbasiya, Global AI, Analytics, & Data Management Business Development, Unstructured Data Solutions, Dell Technologies Sep 29, 2023 5 mins Artificial Intelligence brandpost Embrace the Generative AI revolution: a guide to integrating Generative AI into your operations The CTO of SAP shares his experiences and learnings to provide actionable insights on navigating the GenAI revolution. By Juergen Mueller Sep 29, 2023 4 mins Artificial Intelligence feature 10 most in-demand generative AI skills Gen AI is booming, and companies are scrambling to fill skills gaps by hiring freelancers to make the most of the technology. These are the 10 most sought-after generative AI skills on the market right now. By Sarah K. White Sep 29, 2023 8 mins Hiring Generative AI IT Skills feature Top 17 cloud cost management tools — and how to choose Cloud cost analysis tools help your organization keep on top of its overall cloud use and associated costs, which can add up rapidly. By Peter Wayner Sep 29, 2023 14 mins Cloud Management Cloud Computing Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe