By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
BYOD and mobile device security best practices News
November 15, 2017
In this week's Risk & Repeat podcast, SearchSecurity editors discuss the recent discovery of a fake WhatsApp app in the Google Play Store and what that means for app store security.
July 28, 2017
Application security expert Michael Cobb discusses the Samsung Knox platform and its ability to improve Android device security in the enterprise.
July 07, 2017
Broadpwn, a flaw in Broadcom Wi-Fi chipsets, is patched, but Google withholds details. Plus, the latest in the antivirus drama between the U.S. and Russia, and more.
May 26, 2017
End users are in the crosshairs of business data privacy issues, especially when it comes to information gleaned from artificial intelligence technologies.
BYOD and mobile device security best practices Get Started
Bring yourself up to speed with our introductory content
Do you know how to take care of mobile endpoint security in your enterprise? This guide walks you through all aspects of the issue, from policy and strategy to emerging threats. Continue Reading
Android device security is getting a boost with its newest version, Android N. Expert Michael Cobb explains the effects on enterprise users, and the changes in encryption. Continue Reading
Google's second Android Security Report revealed changes and upgrades made to the OS. Expert Michael Cobb covers the important takeaways for enterprises. Continue Reading
Evaluate BYOD and mobile device security best practices Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Google's new security platform, Google Play Protect, looks to decrease Android app security threats through machine learning. Michael Cobb explains how the new platform works. Continue Reading
The wrong move can make or break your enterprise mobility management implementation. Broad device support, automated enrollment and single sign-on are must-have features. Continue Reading
Mobile application assessments can help enterprises decide which apps to allow, improving security. Christopher Crowley of the SANS Institute discusses how to use app assessments. Continue Reading
Manage BYOD and mobile device security best practices
Learn to apply best practices and optimize your operations.
This mobile security requirements checklist outlines the vital steps for information security professionals to follow to improve mobile security in their companies. Continue Reading
Keeping your Wi-Fi secure is a challenge, to say the least. Security hasn't kept up with Wi-Fi advances, but there are steps you can take to keep your Wi-Fi network protected. Continue Reading
Can two-factor authentication be applied to a mobile device that's used as a 2FA factor? Michael Cobb explores the different knowledge factors and uses for mobile devices. Continue Reading
Problem Solve BYOD and mobile device security best practices Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Need to learn how to secure a Wi-Fi network? You'll need to be both flexible and focused, given the growing threats and multiplying devices riding on most networks now. Continue Reading
Learning to secure endpoints will increase your ability to keep data safe. First thing to do: Find and fix any weaknesses that hackers can use to enter your system. Continue Reading
Using personal Gmail accounts for business purposes is not a secure enterprise BYOD strategy. Expert Matthew Pascucci discusses why companies should avoid implementing this tactic. Continue Reading