Handheld and Mobile Device Security Best Practices News
May 13, 2016
MobileIron's enterprise mobile management software wasn't installed on the iPhone of San Bernardino shooter Syed Rizwan Farook. Was that the right move?
April 15, 2016
The encryption debate continues with release of the official draft of Burr-Feinstein 'Compliance with Court Orders Act of 2016' mandating court order compliance.
April 08, 2016
WhatsApp encryption was turned on for all types of messaging, including group chats, which advanced the conversation on 'going dark,' as new encryption legislation draft goes public.
November 10, 2015
Bluebox Security unveiled a troubling study on mobile application threats and also introduced a new product to protect consumer apps on employee-owned devices.
Handheld and Mobile Device Security Best Practices Get Started
Bring yourself up to speed with our introductory content
A vulnerability in the AirDroid device manager app left users at risk of phone hijacking. Expert Michael Cobb explains how the exploit works, and what can be done to prevent it. Continue Reading
Initially, concerns about mobile security were centered around basic controls such as remote wipe. Naturally, though, the focus has shifted to the heart of the mobile enterprise: the app. Mobile app security threats are in their early days, and the ... Continue Reading
A vulnerability was found in the Blackphone's Icera modem. Expert Michael Cobb explains how attackers could hijack the device, and if this would occur in other mobile devices. Continue Reading
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Evaluate Handheld and Mobile Device Security Best Practices Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Threats evolve, so your mobile security must too. Learn how an app container, app wrapper and other tactics help keep bad guys away from corporate assets. Continue Reading
Do the significant improvements made by Google to Android 5 security mean Android devices are ready for enterprise use? Learn how Android stacks up against other mobile OS. Continue Reading
What does FIPS 140-2 Level 2 certification for devices cover? Expert Michael Cobb explains the FIPS 140-2 security standard and how vendors use it in their claims. Continue Reading
Manage Handheld and Mobile Device Security Best Practices
Learn to apply best practices and optimize your operations.
Amazon disabled native encryption capabilities in the latest Fire OS version. Expert Michael Cobb explains what this means for security, and if encryption can be reinstated. Continue Reading
BYOD isn't a new trend, but tablet security policy is increasingly important as users choose them over laptops for work. Expert Mike O. Villegas discusses tablet security policies. Continue Reading
Securing Android devices in the enterprise can seem like an uphill task. Applying these Android security policies might reduce the struggle security professionals face. Continue Reading
Problem Solve Handheld and Mobile Device Security Best Practices Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
The basic level of mobile security is to protect data and access to a network, but understanding the needs of mobile users and their devices is the key to maturing that strategy. Continue Reading
CISOs are tasked with developing an effective enterprise mobile strategy that offers different levels of mobile security, from device management to application-layer controls. Some companies are moving beyond device management and containerization ... Continue Reading
Dead and outdated apps can pose serious security risks for enterprises. Expert Nick Lewis explains how to find and remove dead apps before they become a problem. Continue Reading