The risks of running Android apps on BlackBerry 10

Handheld and Mobile Device Security Best Practices

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • The rapid evolution of MDM solutions

    Mobile device management (MDM) continues to grow at a feverish pace, both in terms of adoption and mobile security features. BYOD policies, and the rapid turnover in consumer mobile technology, have left many organizations grappling with MDM requirem... 

  • Seven Outstanding Security Pros in 2012

    Find out who won this year’s Security 7 Award, which honors outstanding security professionals in seven vertical markets. Also in this issue, we examine the pros and cons of the Metasploit penetration testing framework, and ways to overcome cloud com... 

  • Strategies for tackling BYOD: How to ensure mobile security

    Bring your own device (BYOD) and the consumerization of IT are realities of the modern workplace that cannot be ignored. When employees are empowered with the choice of using their own consumer-based devices in the workplace, it is imperative to coun... 

  • An inside look at network security technologies

    Finding malware, or worse, attackers pivoting from server to server on your network, is a difficult proposition. Persistent, motivated hackers are adept at developing code that evades detection from signature-based network security devices. And more ... 

  • New security strategies for the bring-your-own-device era

    Access this month’s issue to uncover strategies for taming the bring-your-own-device (BYOD) tide. In addition, explore other featured topics including VMware’s security partner program revamp, four keys to data loss prevention (DLP) success, top cons... 

  • BYOD means creating a new security game plan in the enterprise

    This month's Information Security magazine online cover story highlights the importance for an updated security game plan due to the influx of personal smartphones and other computing devices making their way into the enterprise. Also, learn how to f... 

  • mobile security (wireless security)

    Mobile security is the protection of smartphones, tablets, laptops and other portable computing devices, and the networks they connect to, from threats and vulnerabilities associated with wireless computing. Mobile security is also known as wireless ... 

  • Surface (Microsoft Surface tablet)

    Surface is a line of tablet computers from Microsoft. Surface tablets will have a 10.6-inch wide display and come with USB support, dual Wi-Fi antennae, a built-in kick stand and a keyboard that doubles as the tablet’s cover.  

About Handheld and Mobile Device Security Best Practices

Enhance handheld security in several ways, such as encryption, to prevent hacker attacks, threats, flaws and vulnerabilities on your BlackBerry, iPhone, Bluetooth, Windows, Symbian, Palm and all other mobile devices.