New & Notable
Handheld and Mobile Device Security Best Practices News
November 21, 2014
News roundup: As the industry responds to growing demand for end-to-end Internet encryption, some fear unintended consequences. Plus: Black hats wanted; Windows Phone survives Pwn2Own; webcam spying resurgence.
October 31, 2014
News roundup: Verizon gave its mobile users an early Halloween trick: a cookie that cannot be erased, despite a number of privacy concerns. Also: compromising an air-gapped computer over the air; an alleged government-funded hack against a CBS ...
September 23, 2014
A new Ponemon survey shows that while enterprises may harbor concerns about BYOD security, business-wide use of personal mobile devices is growing rapidly.
September 19, 2014
News roundup: Rogue cell phone towers are popping up across the United States, heightening enterprise communication and data privacy concerns. Plus: Goodwill breach update; Adobe patches released; and security in 2025.
Handheld and Mobile Device Security Best Practices Get Started
Bring yourself up to speed with our introductory content
The Android-based Blackphone claims to be able to provide more security than the standard smartphones available today. Expert Kevin Beaver explores the reality of the assertion. Continue Reading
Smartphone and tablet use in the enterprise can help boost productivity, improve employee satisfaction and lower costs. However, it is also fraught with risk. Expert Lisa Phifer discusses the risks and rewards of going mobile in the enterprise. Continue Reading
Application security expert Michael Cobb explains how companies can defend themselves against the growing threat of mobile keystroke logging. Continue Reading
Evaluate Handheld and Mobile Device Security Best Practices Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Readers vote on the best mobile data security products of 2014. Continue Reading
A smartphone kill switch aims to reduce device theft by rendering a device unusable if stolen. Expert Michael Cobb discusses what the technology means from an enterprise point of view. Continue Reading
Though perhaps a ways off, it may be worthwhile to prepare a Google Glass security policy now, before it's a problem. Expert Joseph Granneman explains what to expect. Continue Reading
Manage Handheld and Mobile Device Security Best Practices
Learn to apply best practices and optimize your operations.
The iBanking malware has evolved to target Android devices. Enterprise threats expert Nick Lewis offers pointers on how to detect this malware on Android as well as prevent the threat. Continue Reading
The bring your own device (BYOD) movement, which has flooded the enterprise with employee-owned smartphones, tablets, phablets and purse-sized laptops, has complicated even more the job of information security pros. Mobile device management (MDM) ... Continue Reading
Bring your own device has a number of inherent security challenges. Expert Lisa Phifer explains how a mobile device management product can help your enterprise conquer BYOD risks. Continue Reading
Problem Solve Handheld and Mobile Device Security Best Practices Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
A variety of malware that steals passwords from jailbroken iPhones and iPads is becoming an enterprise concern. Expert Nick Lewis explains how to mitigate the risk. Continue Reading
Ensuring BYOD access in an enterprise environment can be quite challenging, especially when it comes to balancing security with employee satisfaction. Learn about different Windows 8.1 features that can help ease the process. Continue Reading
Employees who work on-the-go rely on Wi-Fi access to get work done, but are those connections secure? Expert Kevin Beaver explains how to achieve Wi-Fi access security success. Continue Reading