Email Alerts
-
How Android users can overcome LeNa malware, slow carrier updates
Android users can't rely on slowly deployed carrier updates to protect them from the LeNa malware. Expert Nick Lewis explains. Answer
-
Advice on IT security for users when the BYOD security policy fails
Security expert Nick Lewis suggests how each individual enterprise can deal with mobile security risk by instituting a BYOD security policy to fit its needs. Answer
-
Defend against iPad exploit, rogue access point attacks
An iPad exploit that attacks a rogue access point is dangerous for enterprises and home users. Expert Nick Lewis explains how to defend against it. Answer
-
BYOD security policy: Mitigate BYOD risk with device requirements
How can enterprises mitigate the BYOD risk? Expert Michael Cobb suggests some device requirements to include in a BYOD security policy. Answer
-
Preparing for Windows 8 BYOD: Security features on Windows 8 tablets
How should enterprises be preparing for Windows 8 BYOD tablets? Expert Michael Cobb breaks down the security features for Microsoft's upcoming OS. Answer
-
What are the costs and benefits of Good Mobile Access for Android?
Expert Michael Cobb details the costs and benefits of Android GMA, which raises the bar for mobile browser security. Answer
-
How to secure Android devices: Advice for good Android lock patterns
Get advice from expert Michael Cobb on how to secure your Android device with good Android lock patterns. Answer
-
Enterprises must help identify secure mobile apps, define malware
Expert Nick Lewis explains the role enterprises should play in helping BYOD users define malware and identify secure mobile apps. Answer
-
Does accelerometer research portend keyboard-vibration attacks?
Expert Nick Lewis examines smartphone accelerometer research that may lead to keyboard-vibration attacks via a smartphone on a nearby computer. Answer
-
How acceptable use agreements can combat BYOD security issues
Is your organization facing BYOD security issues? Learn how the implementation of acceptable use agreements can help contain these issues. Answer
Security Management Strategies for the CIO