Email Alerts
-
Enterprise app store encryption: Lessons to learn from Apple
After the Apple App Store's security mishap, expert Michael Cobb details the minimum enterprise app store encryption requirements. Answer
-
Should Android kernel vulnerabilities make enterprises avoid Samsung?
Expert Nick Lewis discusses the threat and significance of Android kernel vulnerabilities found in popular Samsung mobile devices. Answer
-
Can a password blacklist improve general enterprise password security?
Expert Michael Cobb reacts to the BlackBerry 10 password blacklist and determines whether enterprises could adopt it to further secure passwords. Answer
-
Is Google Private Channel more secure than an enterprise app store?
Is the Google Private Channel a more secure option than building an internal enterprise app store? Expert Michael Cobb discusses. Answer
-
Mitigations for mobile phishing problems on the iOS platform
With potential phishing problems surfacing for iOS users, expert Nick Lewis provides advice for enterprises facing the mobile phishing menace. Answer
-
Windows Phone 8 security: An enterprise alternative to BlackBerry?
Expert Michael Cobb assesses Windows Phone 8 security to determine whether WP8 devices are safe enough to replace the BlackBerry in the enterprise. Answer
-
Windows RT security: Does Microsoft's mobile OS differ from Windows 8?
How should enterprises prepare for securing Windows RT devices? Expert Michael Cobb discusses the security differences between Windows RT and 8. Answer
-
How should NFC security risks affect a BYOD security policy?
Security expert Nick Lewis explores the emerging security risks posed by NFC technology and discusses their effect on enterprise BYOD policy. Answer
-
Does the iOS Security Guide reveal any Apple iOS security issues?
Expert Michael Cobb digs into the Apple iOS Security Guide to see if any iOS security issues are revealed. Answer
-
Establish a screen timeout period as part of a BYOD security policy
Expert Michael Cobb provides advice on why and how enterprises should establish a screen timeout period as part of any BYOD security policy. Answer
Security Management Strategies for the CIO