Handheld and Mobile Device Security Best Practices News
November 16, 2016
Researchers discover Italian-sourced Android spyware linked to Hacking Team, but it could be the work of another surveillance software vendor.
September 30, 2016
In part two of his interview with SearchSecurity, MobileIron's James Plouffe talks about his role as a technical consultant on 'Mr. Robot' and how the show achieves its authenticity.
September 29, 2016
A new report from MobileIron shows enterprises aren't taking mobile threats seriously enough. MobileIron's James Plouffe explains what that is and what's to be done about it.
May 13, 2016
MobileIron's enterprise mobile management software wasn't installed on the iPhone of San Bernardino shooter Syed Rizwan Farook. Was that the right move?
Handheld and Mobile Device Security Best Practices Get Started
Bring yourself up to speed with our introductory content
Android device security is getting a boost with its newest version, Android N. Expert Michael Cobb explains the effects on enterprise users, and the changes in encryption. Continue Reading
Google's second Android Security Report revealed changes and upgrades made to the OS. Expert Michael Cobb covers the important takeaways for enterprises. Continue Reading
The Google Play services app runs in the background on Android devices and gives apps access to core functionalities such as authentication services; it should not be disabled. Continue Reading
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Evaluate Handheld and Mobile Device Security Best Practices Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
IT asset tracking can be used to ensure devices stay in a precise location, or to trace missing devices. Expert Michael Cobb covers the most popular products and services. Continue Reading
Threats evolve, so your mobile security must too. Learn how an app container, app wrapper and other tactics help keep bad guys away from corporate assets. Continue Reading
Initially, concerns about mobile security were centered around basic controls such as remote wipe. Naturally, though, the focus has shifted to the heart of the mobile enterprise: the app. Mobile app security threats are in their early days, and the ... Continue Reading
Manage Handheld and Mobile Device Security Best Practices
Learn to apply best practices and optimize your operations.
In this Risk & Repeat podcast, SearchSecurity talks with James Plouffe, lead solutions architect at MobileIron and a technical advisor for the television series 'Mr. Robot.' Continue Reading
Amazon disabled native encryption capabilities in the latest Fire OS version. Expert Michael Cobb explains what this means for security, and if encryption can be reinstated. Continue Reading
A vulnerability in the AirDroid device manager app left users at risk of phone hijacking. Expert Michael Cobb explains how the exploit works, and what can be done to prevent it. Continue Reading
Problem Solve Handheld and Mobile Device Security Best Practices Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
The basic level of mobile security is to protect data and access to a network, but understanding the needs of mobile users and their devices is the key to maturing that strategy. Continue Reading
CISOs are tasked with developing an effective enterprise mobile strategy that offers different levels of mobile security, from device management to application-layer controls. Some companies are moving beyond device management and containerization ... Continue Reading
Dead and outdated apps can pose serious security risks for enterprises. Expert Nick Lewis explains how to find and remove dead apps before they become a problem. Continue Reading