Handheld and Mobile Device Security Best Practices

Handheld and Mobile Device Security Best Practices News

  • November 21, 2014 21 Nov'14

    Encryption everywhere: Debating the risks and rewards

    News roundup: As the industry responds to growing demand for end-to-end Internet encryption, some fear unintended consequences. Plus: Black hats wanted; Windows Phone survives Pwn2Own; webcam spying resurgence.

  • October 31, 2014 31 Oct'14

    Verizon's mobile persistent cookie is more trick than treat

    News roundup: Verizon gave its mobile users an early Halloween trick: a cookie that cannot be erased, despite a number of privacy concerns. Also: compromising an air-gapped computer over the air; an alleged government-funded hack against a CBS ...

  • September 23, 2014 23 Sep'14

    BYOD security concerns not deterring personal device use

    A new Ponemon survey shows that while enterprises may harbor concerns about BYOD security, business-wide use of personal mobile devices is growing rapidly.

  • September 19, 2014 19 Sep'14

    Rogue IMSI catchers heighten enterprise cell phone security risks

    News roundup: Rogue cell phone towers are popping up across the United States, heightening enterprise communication and data privacy concerns. Plus: Goodwill breach update; Adobe patches released; and security in 2025.

View All News

Handheld and Mobile Device Security Best Practices Get Started

Bring yourself up to speed with our introductory content

View All Get Started

Evaluate Handheld and Mobile Device Security Best Practices Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

Product Reviews

Powered by IT Central Station View All Evaluate

Manage Handheld and Mobile Device Security Best Practices

Learn to apply best practices and optimize your operations.

View All Manage

Problem Solve Handheld and Mobile Device Security Best Practices Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve