MOBILE SECURITY

Employees are more mobile than ever and are using their own devices to access corporate data, making mobile security one of the biggest challenges for IT security teams. We keep you up to date on the technology and best practices that can keep corporate data safe in that most vulnerable of places – on an employee's smartphone.

LATEST MOBILE SECURITY ARTICLES

VPN Security: How VPNs Work and How to Buy the Best One

|

Virtual private networks (VPNs) come with many different protocols and features, so choosing the best one for your organization requires some research. We outline your options.

READ MORE

Comodo AEP Eschews Tradition to Bring a New Level of Protection to the Enterprise

|

Comodo’s Advanced Endpoint Protection (AEP) brings AI-powered analysis and a default-deny containment approach to the enterprise.

READ MORE

Google Patches Android and Chrome for Security Vulnerabilities

|

Android June update and Chrome 59 provide fixes for security flaws.

READ MORE

Sensory's TrulySecure Biometric Security Gets an AI Upgrade

|

The company's latest update to its TrulySecure biometrics technology includes advanced deep learning algorithms that are tougher to trick.

READ MORE

Mobile Malware: What It Is and How to Stop It

|

Mobile malware is growing. Do you know what mobile malware is and more importantly, how to keep it off your device?

READ MORE

TOP MOBILE SECURITY RESOURCES

ENTERPRISE MOBILITY MANAGEMENT (EMM)

When it comes to Bring Your Own Device (BYOD), Mobile Device Management (MDM) isn't enough anymore. That's what Enterprise Mobility Management (EMM) is all about.

READ MORE

MOBILE DEVICE MANAGEMENT (MDM)

Learn what Mobile Device Management (MDM) is all about and why it's being supplanted by Enterprise Mobility Management (EMM).

READ MORE

BRING YOUR OWN DEVICE (BYOD)

The Bring Your Own Device, or BYOD, era has redefined the modern corporate landscape. Learn about the risks - and the tools you can use to securely embrace BYOD.

READ MORE

MOBILE MALWARE

Mobile malware is growing. Do you know what mobile malware is and more importantly, how to keep it off your device?

READ MORE

SECURITY DAILY NEWSLETTER

GET SECURITY NEWS IN YOUR INBOX EVERY DAY
|

Mobile Application Management Platform Evaluation Checklist

Mobile application management (MAM) refers to the workflow for security, governance, and distribution of mobile apps in the enterprise. Best-of-breed MAM provides app-level security for any app, deploys apps to every user in the extended enterprise because it is device management agnostic, …
 
SEE ALL WHITEPAPERS
 
Hackers Leverage Flaws in SS7 to Drain Victims' Bank Accounts

Hackers Leverage Flaws in SS7 to Drain Victims' Bank Accounts

|

The attackers were able to redirect SMS messages used for two-factor authentication in order to approve money transfers.

READ MORE
Google Patches 17 Critical Vulnerabilities in Android May Security Update

Google Patches 17 Critical Vulnerabilities in Android May Security Update

|

Google is out with its fifth patch update of 2017, with mediaserver flaws once again topping the list.

READ MORE
64 Percent of Security Pros Can't Stop a Mobile Data Breach

64 Percent of Security Pros Can't Stop a Mobile Data Breach

|

And 51 percent believe the risk of mobile data loss is equal to or greater than that for PCs, a recent survey found.

READ MORE
Identity and Access Management: Balancing Access and Security

Identity and Access Management: Balancing Access and Security

|

In an era where hackers seem to have the upper hand, organizations can take greater control of networks and data with Identity and Access Management (IAM). We outline IAM security technology and solutions and discuss how to utilize it to protect your business.

READ MORE