New & Notable
Handheld and Mobile Device Security Best Practices News
July 25, 2014
News roundup: The revelation of potential iOS backdoors -- and Apple's perceived acknowledgement of them -- has sparked debate over the definition of a backdoor and raised concerns over iOS security.
July 23, 2014
While BlackBerry's CEO touts the mobile platform's security features, experts question whether the advantage over iOS and Android still exists.
April 16, 2014
Though millions of Android devices could contain the Heartbleed OpenSSL vulnerability, experts say the risk to Android users may not be that great.
March 03, 2014
Mobile security gaps stretch from distributed architecture to data leaks. Address security and privacy concerns before any coding starts.
Handheld and Mobile Device Security Best Practices Get Started
Bring yourself up to speed with our introductory content
Application security expert Michael Cobb explains how companies can defend themselves against the growing threat of mobile keystroke logging. Continue Reading
A secure container, in a mobile computing context, is an isolated, authenticated and encrypted area of an employee's device that keeps sensitive corporate information separate from the owner's personal data and apps. The purpose is to prevent ... Continue Reading
This newly updated Security School lesson breaks down BYOD challenges and help you develop a strategy that cuts across the myriad threats and platforms inside your organization. Continue Reading
Evaluate Handheld and Mobile Device Security Best Practices Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Enterprises should be worried about the growth of BYOD mobile app data slurping. Explore how to combat data slurping and ensure mobile app security. Continue Reading
Apple has provided little transparency of its iOS -- until now. Are Apple devices truly secure enough for enterprise use? Michael Cobb explains. Continue Reading
Developing an enterprise mobile security strategy is a challenge. Nick Lewis offers his insight on the viability of mobile antimalware protection. Continue Reading
Manage Handheld and Mobile Device Security Best Practices
Learn to apply best practices and optimize your operations.
A recent proof of concept shines new light on the future of mobile keyloggers. Michael Cobb reviews how to keep touchscreen devices safe from attack. Continue Reading
Michael Cobb explains why an enterprise in-house app store is an effective weapon against malicious mobile apps and dispels common misunderstandings against this means for securing employee devices and company data. Continue Reading
Learn why enterprises must revise their defenses to keep mobile users and data safe, and where to concentrate your IT security budget. Continue Reading
Problem Solve Handheld and Mobile Device Security Best Practices Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
This seven-question quiz will test you on the key points we've covered in the malicious mobile apps Security School by Mike Cobb. Continue Reading
This Security School covers all aspects of dealing with malicious mobile apps, from identifying the real threat to sealing the security perimeter. Continue Reading
In the BYOD era, mobile device security requires a strategy that focuses on data, not device, protection. Continue Reading