By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
BYOD and mobile device security best practices News
July 07, 2017
Broadpwn, a flaw in Broadcom Wi-Fi chipsets, is patched, but Google withholds details. Plus, the latest in the antivirus drama between the U.S. and Russia, and more.
May 26, 2017
End users are in the crosshairs of business data privacy issues, especially when it comes to information gleaned from artificial intelligence technologies.
December 30, 2016
News roundup: FDA issues new medical device cybersecurity guidance. Plus, Obama announces the U.S. government's response to Russian hacking; PHP flaws patched; more.
November 16, 2016
Researchers discover Italian-sourced Android spyware linked to Hacking Team, but it could be the work of another surveillance software vendor.
BYOD and mobile device security best practices Get Started
Bring yourself up to speed with our introductory content
Do you know how to take care of mobile endpoint security in your enterprise? This guide walks you through all aspects of the issue, from policy and strategy to emerging threats. Continue Reading
Android device security is getting a boost with its newest version, Android N. Expert Michael Cobb explains the effects on enterprise users, and the changes in encryption. Continue Reading
Google's second Android Security Report revealed changes and upgrades made to the OS. Expert Michael Cobb covers the important takeaways for enterprises. Continue Reading
Evaluate BYOD and mobile device security best practices Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Mobile application assessments can help enterprises decide which apps to allow, improving security. Christopher Crowley of the SANS Institute discusses how to use app assessments. Continue Reading
Mobile security threats are lurking around every corner. IT admins should encourage advanced security on smartphones and schedule security updates to keep everyone's guard up. Continue Reading
IT asset tracking can be used to ensure devices stay in a precise location, or to trace missing devices. Expert Michael Cobb covers the most popular products and services. Continue Reading
Manage BYOD and mobile device security best practices
Learn to apply best practices and optimize your operations.
In this excerpt from chapter three of Mobile Data Loss, author Michael T. Raggo discusses mobile security countermeasures. Continue Reading
In this Risk & Repeat podcast, SearchSecurity talks with James Plouffe, lead solutions architect at MobileIron and a technical advisor for the television series 'Mr. Robot.' Continue Reading
Amazon disabled native encryption capabilities in the latest Fire OS version. Expert Michael Cobb explains what this means for security, and if encryption can be reinstated. Continue Reading
Problem Solve BYOD and mobile device security best practices Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Android for Work's sandboxing tools, which split work and personal profiles, can be bypassed with a proof-of-concept attack. Expert Michael Cobb explains how the attack works. Continue Reading
Apple now restricts mobile app developers from using hot patching, as the technique can change app behavior after it is reviewed. Expert Kevin Beaver goes over enterprise concerns. Continue Reading
Mobile apps using insecure OAuth could lead to over one billion user accounts being attacked. Expert Michael Cobb explains how developers can implement OAuth securely. Continue Reading