Email Alerts
-
The rapid evolution of MDM solutions
Mobile device management (MDM) continues to grow at a feverish pace, both in terms of adoption and mobile security features. BYOD policies, and the rapid turnover in consumer mobile technology, have left many organizations grappling with MDM requirem... E-Zine
-
Seven Outstanding Security Pros in 2012
Find out who won this year’s Security 7 Award, which honors outstanding security professionals in seven vertical markets. Also in this issue, we examine the pros and cons of the Metasploit penetration testing framework, and ways to overcome cloud com... E-Zine
-
Strategies for tackling BYOD: How to ensure mobile security
Bring your own device (BYOD) and the consumerization of IT are realities of the modern workplace that cannot be ignored. When employees are empowered with the choice of using their own consumer-based devices in the workplace, it is imperative to coun... E-Handbook
-
An inside look at network security technologies
Finding malware, or worse, attackers pivoting from server to server on your network, is a difficult proposition. Persistent, motivated hackers are adept at developing code that evades detection from signature-based network security devices. And more ... E-Handbook
-
New security strategies for the bring-your-own-device era
Access this month’s issue to uncover strategies for taming the bring-your-own-device (BYOD) tide. In addition, explore other featured topics including VMware’s security partner program revamp, four keys to data loss prevention (DLP) success, top cons... E-Zine
-
BYOD means creating a new security game plan in the enterprise
This month's Information Security magazine online cover story highlights the importance for an updated security game plan due to the influx of personal smartphones and other computing devices making their way into the enterprise. Also, learn how to f... E-Zine
-
Mobile device management vs. mobile application management
Mobile device management and mobile application management do different things but also have some overlap. Knowing their differences is important. Let's get this straight
-
Enterprise mobile security by the numbers
Almost 60% of respondents in our 2013 Enterprise Mobile Security Survey believe mobile devices present more risk now than in Q2 2012. What’s changed? Feature
-
MDM products: More calls to secure a mobile workforce
As MDM products rapidly evolve to support the growth of BYOD smartphones and tablets, security professionals need to rethink mobility policies. Feature
-
Apple security update: Is it ready for the enterprise?
It’s hard to declare Apple security as superior to its competitors, but it’s also hard to fault it as inferior. Feature
-
Quiz: Managing BYOD endpoint security
In this six question quiz, test your knowledge of our Security School lesson on managing BYOD endpoint security. Quiz
-
Managing BYOD endpoint security
This Security School will break down those challenges and help you develop and over-arching security strategy that cuts across the myriad threats and platforms inside your organization. partOfGuideSeries
-
BYOD security strategies: Balancing BYOD risks and rewards
Allowing employee-owned mobile devices doesn’t have to mean accepting all BYOD risks. Infosec pros share their BYOD security strategies. Feature
-
Developing a BYOD Strategy: Weigh the Risks, Challenges and Benefits
Organizations need to consider benefits and risks as they embrace BYOD. Feature
-
Quiz: Enterprise mobile device defense fundamentals
In this quick quiz, test your knowledge of our Security School lesson on enterprise mobile device defense fundamentals. Quiz
-
Enterprise mobile device defense fundamentals
This Security School lesson will examine the realities of the security threat posed by mobile devices such as smartphones and tablets, the methods savvy attackers are using today to take advantage of vulnerable mobile devices, and the technology and ... partOfGuideSeries
- See more Essential Knowledge on Handheld and Mobile Device Security Best Practices
-
Enterprise BYOD offers mixed bag for enterprise endpoint security
A Gartner analyst says enterprise BYOD -- specifically iOS and Android devices -- presents many pros and cons for enterprise endpoint security. News | 13 Jun 2013
-
Veracode report highlights key problems in mobile app security
Security testing vendor Veracode has released a report showing that mobile apps aren't getting their cryptography right. News | 10 Apr 2013
-
Vendors showcase MAM products that ease BYOD challenges at RSA 2013
RSA exhibitors offered a range of mobile application management solutions, intended to ease the challenges of monitoring BYOD environments. News | 27 Feb 2013
-
Experts at the CSA 2013 Summit say mobile security depends on cloud security
Panelists at the Cloud Security Alliance Summit say mobile security and cloud security are linked, and that preventing data loss demands securing the app layer. News | 25 Feb 2013
-
Enterprise app security tops list for enterprise mobile deployments
Enterprises have yet to roll out mobile versions of most of their applications, a recent survey says. One key factor moving forward is security. News | 18 Feb 2013
-
Unwrapping a new smartphone? Experts deliver device security tips
A new smartphone or tablet under the Christmas tree should be giftwrapped with a list of security and privacy guidelines, experts say. News | 24 Dec 2012
-
BYOD challenges deter enterprises from adopting policies, survey finds
More than half of mobile-device security decision makers surveyed say that BYOD challenges remain. News | 13 Nov 2012
-
Mobile impacting cloud security issues, says panel
Bring-your-own-device (BYOD) makes securing cloud services complex, say experts. Enterprises should set mobile guidelines consistent with cloud policies. News | 07 Nov 2012
-
Users neglect enterprise mobile device security measures, survey finds
Some employees are failing to enable security capabilities on their smartphones and tablets, putting corporate email and other sensitive data at risk. News | 23 Oct 2012
-
SearchSecurity survey reveals top 5 enterprise mobile security issues
Lost and stolen devices remain two of the top mobile security issues revealed in SearchSecurity.com's 2012 enterprise mobile security survey. News | 17 Aug 2012
- See more News on Handheld and Mobile Device Security Best Practices
-
New data on enterprise mobile security
We polled readers in our annual Enterprise Mobile Security Survey and the 2013 results are in. Opinion
-
Diversity at work: MDM solutions keep pace
Philip Clarke, co-leader of the Wireless and Mobility track at Nemertes Research, reports on what’s ahead for mobile device management solutions. Opinion
-
McGraw's mobile app security strategy: Three legs of 'trusted on busted'
Struggling to define your mobile app security strategy? Gary McGraw offers a manifesto to help get infosec and app developers on the same page. Column
-
Loss of BlackBerry, security benefits would hurt enterprise mobile security
Opinion: BlackBerry security has been a boon to enterprises, and unless security pros help save the platform, enterprise mobile security will suffer. Opinion
-
Unmanaged endpoints? Rethink the defense-in-depth security model
Today's endpoint security model is failing. What's next? Learn why endpoint defense-in-depth controls must assume the endpoint is compromised. Tip
-
BYOD platform support: Why an iOS and Android strategy makes sense
All BYOD platform options come with cost and risk. Craig Mathias explains why an iOS and Android BYOD program is viable for most organizations. Tip
-
BYOD security: How to remotely wipe iPhone and Android devices
Remote data wipe is key to any BYOD security policy, but each OS handles it differently. Lisa Phifer covers how to use it with other controls to protect data. Tip
-
Overview: New PCI mobile application development guidelines
The PCI SSC recently released mobile application development security guidelines. Mike Chapple outlines the document and highlights key takeaways. Tip
-
Under the Surface: How Windows tablet security meets BYOD challenges
Expert Michael Cobb says the forthcoming Windows tablet security features on Microsoft's Surface could help meet enterprise BYOD challenges. Tip
-
Essential enterprise mobile device security controls
Learn about the mobile security controls you should consider when formulating an enterprise mobile security strategy. Tip
-
Mobile security software keeps corporate data safe
BYOD makes it hard to be sure that corporate data isn't compromised, but with MDM and mobile security software, admins can rest a little easier. Tip
-
Balancing mobile payment processing and merchant PCI compliance
Merchant PCI compliance is hard enough, but now mobile payment processing adds a new wrinkle. Learn how P2P encryption can help you stay compliant. Tip
-
Mobile device management system planning and policies
Planning a mobile device management system is a big task, but outlining policies, choosing features and selecting platforms before implementing an MDM program ensure its success. Tip
-
MDM security features vs. mobile native security: Striking a balance
MDM features abound, but should they always trump native security features of mobile devices? Lisa Phifer discusses the pros and cons. Tip
- See more Tips on Handheld and Mobile Device Security Best Practices
-
Enterprise app store encryption: Lessons to learn from Apple
After the Apple App Store's security mishap, expert Michael Cobb details the minimum enterprise app store encryption requirements. Answer
-
Should Android kernel vulnerabilities make enterprises avoid Samsung?
Expert Nick Lewis discusses the threat and significance of Android kernel vulnerabilities found in popular Samsung mobile devices. Answer
-
Can a password blacklist improve general enterprise password security?
Expert Michael Cobb reacts to the BlackBerry 10 password blacklist and determines whether enterprises could adopt it to further secure passwords. Answer
-
Is Google Private Channel more secure than an enterprise app store?
Is the Google Private Channel a more secure option than building an internal enterprise app store? Expert Michael Cobb discusses. Answer
-
Mitigations for mobile phishing problems on the iOS platform
With potential phishing problems surfacing for iOS users, expert Nick Lewis provides advice for enterprises facing the mobile phishing menace. Answer
-
Windows Phone 8 security: An enterprise alternative to BlackBerry?
Expert Michael Cobb assesses Windows Phone 8 security to determine whether WP8 devices are safe enough to replace the BlackBerry in the enterprise. Answer
-
Windows RT security: Does Microsoft's mobile OS differ from Windows 8?
How should enterprises prepare for securing Windows RT devices? Expert Michael Cobb discusses the security differences between Windows RT and 8. Answer
-
How should NFC security risks affect a BYOD security policy?
Security expert Nick Lewis explores the emerging security risks posed by NFC technology and discusses their effect on enterprise BYOD policy. Answer
-
Does the iOS Security Guide reveal any Apple iOS security issues?
Expert Michael Cobb digs into the Apple iOS Security Guide to see if any iOS security issues are revealed. Answer
-
Establish a screen timeout period as part of a BYOD security policy
Expert Michael Cobb provides advice on why and how enterprises should establish a screen timeout period as part of any BYOD security policy. Answer
- See more Expert Advice on Handheld and Mobile Device Security Best Practices
-
mobile security (wireless security)
Mobile security is the protection of smartphones, tablets, laptops and other portable computing devices, and the networks they connect to, from threats and vulnerabilities associated with wireless computing. Mobile security is also known as wireless ... Definition
-
Surface (Microsoft Surface tablet)
Surface is a line of tablet computers from Microsoft. Surface tablets will have a 10.6-inch wide display and come with USB support, dual Wi-Fi antennae, a built-in kick stand and a keyboard that doubles as the tablet’s cover. Definition
-
With SE Android, NSA looks toward more secure Android platform
Video: The NSA's Troy Lange discusses SE Android and how he hopes it will play a role in fostering improved Android platform security for enterprises. Video
-
BYOD at the NSA? Maybe someday with mobile hardware root of trust
Video: Troy Lange discusses the issues thwarting BYOD at the NSA, and talks about promising mobile security technologies like hardware root of trust. Video
-
McGraw: Mobile app security issues demand trustworthy computing
Video: Cigital's Gary McGraw discusses the top mobile app security issues, and why it's time to apply trustworthy computing concepts to mobile devices. Video
-
NSA's Troy Lange details NSA mobile security strategy
Video: NSA mobility mission manager Troy Lange discusses the NSA mobile security strategy, including mistakes made and lessons learned. Video
-
Tactical Success for Multiplatform Endpoint Security
In this presentation, Craig Mathias discusses the hottest trend in enterprise IT today: BYOD. This discussion focuses on bring your own device (BYOD) security challenges, security techniques and management strategies. Mathias offers key recommendatio... Video
-
Lisa Phifer's five-step plan for securing BYODs
Learn five steps to enable safe, productive use of consumer smartphones, tablets and other mobile devices purchased by employees. Video
-
Mobile malware and social malware: Nipping new threats in the bud
Learn mobile and social media malware prevention tactics as contributor Lisa Phifer analyzes the malware risks of social media and mobile devices. Video
-
Why smartphone security policy is more effective than MDM tools
Video: Expert Aaron Turner explains why sound smartphone security policy is more effective than MDM tools for securing enterprise mobile devices. Video
-
Mobile device security now an imperative
Consumerization is transforming how enterprises secure mobile devices. Zeus Kerravala, Principal Analyst at ZK Research, surveys the threat landscape. Video
-
The challenges of mobile device security policy enforcement
Video: Deloitte mobile security expert David Melnick discusses the challenges of mobile device security policy enforcement and how to develop reasonable controls. Video
- See more Multimedia on Handheld and Mobile Device Security Best Practices
-
Mobile device management vs. mobile application management
Mobile device management and mobile application management do different things but also have some overlap. Knowing their differences is important. Let's get this straight
-
Enterprise app store encryption: Lessons to learn from Apple
After the Apple App Store's security mishap, expert Michael Cobb details the minimum enterprise app store encryption requirements. Answer
-
New data on enterprise mobile security
We polled readers in our annual Enterprise Mobile Security Survey and the 2013 results are in. Opinion
-
Enterprise mobile security by the numbers
Almost 60% of respondents in our 2013 Enterprise Mobile Security Survey believe mobile devices present more risk now than in Q2 2012. What’s changed? Feature
-
Unmanaged endpoints? Rethink the defense-in-depth security model
Today's endpoint security model is failing. What's next? Learn why endpoint defense-in-depth controls must assume the endpoint is compromised. Tip
-
Enterprise BYOD offers mixed bag for enterprise endpoint security
A Gartner analyst says enterprise BYOD -- specifically iOS and Android devices -- presents many pros and cons for enterprise endpoint security. News
-
Should Android kernel vulnerabilities make enterprises avoid Samsung?
Expert Nick Lewis discusses the threat and significance of Android kernel vulnerabilities found in popular Samsung mobile devices. Answer
-
MDM products: More calls to secure a mobile workforce
As MDM products rapidly evolve to support the growth of BYOD smartphones and tablets, security professionals need to rethink mobility policies. Feature
-
Diversity at work: MDM solutions keep pace
Philip Clarke, co-leader of the Wireless and Mobility track at Nemertes Research, reports on what’s ahead for mobile device management solutions. Opinion
-
The rapid evolution of MDM solutions
Mobile device management (MDM) continues to grow at a feverish pace, both in terms of adoption and mobile security features. BYOD policies, and the rapid turnover in consumer mobile technology, have left many organizations grappling with MDM requirem... E-Zine
- See more All on Handheld and Mobile Device Security Best Practices
About Handheld and Mobile Device Security Best Practices
Enhance handheld security in several ways, such as encryption, to prevent hacker attacks, threats, flaws and vulnerabilities on your BlackBerry, iPhone, Bluetooth, Windows, Symbian, Palm and all other mobile devices.
Security Management Strategies for the CIO