Email Alerts
-
Is Google Private Channel more secure than an enterprise app store?
Is the Google Private Channel a more secure option than building an internal enterprise app store? Expert Michael Cobb discusses. Answer
-
Apple security update: Is it ready for the enterprise?
It’s hard to declare Apple security as superior to its competitors, but it’s also hard to fault it as inferior. Feature
-
With SE Android, NSA looks toward more secure Android platform
Video: The NSA's Troy Lange discusses SE Android and how he hopes it will play a role in fostering improved Android platform security for enterprises. Video
-
Veracode report highlights key problems in mobile app security
Security testing vendor Veracode has released a report showing that mobile apps aren't getting their cryptography right. News
-
BYOD at the NSA? Maybe someday with mobile hardware root of trust
Video: Troy Lange discusses the issues thwarting BYOD at the NSA, and talks about promising mobile security technologies like hardware root of trust. Video
-
McGraw: Mobile app security issues demand trustworthy computing
Video: Cigital's Gary McGraw discusses the top mobile app security issues, and why it's time to apply trustworthy computing concepts to mobile devices. Video
-
NSA's Troy Lange details NSA mobile security strategy
Video: NSA mobility mission manager Troy Lange discusses the NSA mobile security strategy, including mistakes made and lessons learned. Video
-
Vendors showcase MAM products that ease BYOD challenges at RSA 2013
RSA exhibitors offered a range of mobile application management solutions, intended to ease the challenges of monitoring BYOD environments. News
-
Experts at the CSA 2013 Summit say mobile security depends on cloud security
Panelists at the Cloud Security Alliance Summit say mobile security and cloud security are linked, and that preventing data loss demands securing the app layer. News
-
Quiz: Managing BYOD endpoint security
In this six question quiz, test your knowledge of our Security School lesson on managing BYOD endpoint security. Quiz
Security Management Strategies for the CIO