Mobile

Types of Mobile Malware & Solutions

As users have increasingly moved from desktop operating systems to mobile devices as their primary form of computing, cyber attackers have taken notice and malware has follo...

Google Patches 17 Critical Vulnerabilities in Android May Security Update

Google is pushing out its May patch update for Android devices this week, with the much maligned mediaserver component once again being patched for critical vulnerabilities.The...

What is Mobile Device Management (MDM)?

The era of employees bringing their own devices into corporate environments created the need for advanced technology platforms to help control all types of devices. Bring Your Own Device, often shorte...

Ultimate Guide to BYOD Security

A core element of computing access is end users and their devices. It is the device that will access a network or corporate application and it is often the device that represents the "last mile" of se...

Enterprise Mobility Management Guide

The modern enterprise is mobile and employees are no longer tethered to their corporate owned and provisioned computing equipment. As is the case in the wired world, mobile ...

Major Security Flaws Uncovered in Samsung’s Tizen Operating System

Equus Software security researcher Amihai Neiderman recently uncovered several major security flaws in Samsung's Linux-based Tizen operating system, which the company uses in its Galaxy Gear smartwa...

What is a Cloud Access Security Broker (CASB)?

What is a CASB? A CASB provides enterprises with a critical control point for the secure use of cloud services across multiple cloud providers. Software as a service (SaaS) apps are becomi...

TrackVia Combines Low-Code Apps with Security Best Practices

In many cases, IT security has become a victim to digital transformations — a situation that has led to breaches and data theft.Seeking expediency in application development and delivery, enterprise...

Ransomware App Found in Google Play Store

Check Point researchers recently found mobile ransomware embedded in an app called EnergyRescue, which was available from the official Google Play store.The malware, called Charger, steals contact i...

3 Ways CISOs Can Partner with Chief Data Officers

"My role as chief data officer is to oversee four things ... that I think are critically important," said Nick Marko as he moderated a panel discussion on the evolving role o...

Latest articles