Beyond the Page: Strategies for a secure mobile device program

This Beyond the Page focuses on how mobile application management can help CISOs move beyond consumer-oriented endpoints and their security tradeoffs.

This Content Component encountered an error

As organizations struggle with a mix of corporate-issued devices and personally owned mobile devices, they seek to empower their workforce without compromising security. Which technologies are best suited to address internal and external threats as enterprises work to secure mobile applications and data? The options are many, ranging from network-based mobile device management controls and native OS

BEYOND THE PAGE

This multimedia supplement to Information Security magazine is a concise package of material that provides security pros and decision makers the in-depth information they need for implementing, managing or troubleshooting timely security issues.

 management to secure containers and virtual infrastructure with hypervisors on mobile devices. We explore mobile application management designed to help CISOs move beyond consumer-oriented endpoints and their security tradeoffs. 

Feature: Mobile security: The battle beyond malware
Enterprises must adapt to the ubiquity of mobile devices in the workplace. Evolving threats and new attack surfaces demand that your mobile security strategy keep pace.

Video: After malware: The next mobile security battle
Monitoring for malware isn’t enough. Enterprise IT pros must evolve their security strategy in the mobile era, because you can bet attackers will. In this video presentation, Andrew Hoog, CEO and co-founder of viaForensics, looks at the threats to mobile devices and what can be done to battle them effectively.

Tip: Defend against mobile threats by reverse engineering Android
Find hidden malware or security weaknesses by decompiling Android applications into Java source code.

About the expert
Andrew Hoog is CEO and co-founder of viaForensics. As a mobile security researcher and computer scientist, he has spoken at major banking, security and forensic conferences and regularly provides briefings for senior government officials. He is the author of two books on security, iPhone and iOS Forensics and Android Forensics, and has two patents pending in the areas of forensics and data recovery. Mr. Hoog holds a Bachelor of Arts degree in computer science from Saint Louis University and is completing a Master of Business Administration degree from University of Chicago’s Booth School of Business.  

 

This was first published in April 2014

Dig deeper on Information Security Policies, Procedures and Guidelines

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close