New & Notable
BYOD and mobile device security best practices News
May 17, 2019
Google product manager Christiaan Brand discusses the journey to making 1.5 billion Android devices work as 2FA security keys and the plan for the future.
May 08, 2019
After being a no-show at last year's conference, security and privacy improvements were big themes at Google I/O's first day, including discussion on federated learning.
December 31, 2018
Vulnerable dating apps on BYODs pose risks to more than just individual users. Find out what security flaws are common in these apps and what they mean for enterprises.
June 22, 2018
Android and iOS mobile apps that use unprotected Firebase databases leaked over 100 million records that include PHI, financial records and authentication information.
BYOD and mobile device security best practices Get Started
Bring yourself up to speed with our introductory content
The policies organizations should deploy for BYOD devices compared to kiosk devices are very different. Learn how organizations should approach these policy decisions. Continue Reading
IAM is evolving to incorporate new technologies -- like cloud-based services and containerization -- promising more secure, granular management of access to company IT assets. Continue Reading
In this post-perimeter era, endpoint detection and response tools can provide essential protection to thwart advanced persistent threats. Learn what EDR offers. Continue Reading
Evaluate BYOD and mobile device security best practices Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
As smart card adoption increases, it is prudent to take a closer look at how this technology can improve data security. Here, read more about the benefits of smart cards. Continue Reading
Threats evolve, and so should mobile security strategies. Mike Chapple explains how an app containers and app wrapping can protect enterprise devices and corporate assets. Continue Reading
With vendors expanding their horizons from just MDM to more comprehensive EMM products, it is crucial to look at these EMM vendors who offer MDM capabilities. Continue Reading
Manage BYOD and mobile device security best practices
Learn to apply best practices and optimize your operations.
Building a data protection strategy around remote working requires companies to enable employee access to data while ensuring that it is protected from threats such as shadow IT. Continue Reading
BYOD policies aren't the same as corporate-owned device policies, so organizations must factor in regulatory concerns and mobile app management before they create the policy. Continue Reading
IAM is an organization's best defense for its weakest link, end users. Make sure you're following the right framework and keeping your tools honed and ready for battle. Continue Reading
Problem Solve BYOD and mobile device security best practices Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Security risks have increased during the pandemic as remote workers try to get things done. Find out how CISOs can better manage by creating a shadow IT policy. Continue Reading
The worldwide health pandemic has created multiple challenges for today's CISOs and their security teams. Ask these three questions to stay safe in a post-pandemic workplace. Continue Reading
Post-pandemic, organizations must strike the right balance between on-site and work-from-home cybersecurity. Here's how to make sure your cybersecurity program is prepared. Continue Reading