Three Essential Mobile Security Measures

CTOvision

Read Andrew Hoog explain the three essential mobile security measures every company should adopt on DZone Blog : Many of us have heard of the 80/20 rule, also known as the ‘Pareto Principle.’ Applied to mobile application security, the idea is that guarding against threats with the greatest potential impact can mitigate 80 percent of […]. Cyber Security News

Mobile 100

8 Tips for More Secure Mobile Computing

CTOvision

Security professionals often talk about the importance of enlisting users as allies in the battle for better security. When it comes to mobile security, that alliance must be a working reality rather than a managerial dream — namely because these handheld machines are typically employee-owned, thus placing their use and precise configuration out of the […].

Creating Enterprise Data and Mobility Security

Data Center Knowledge

As more users utilize mobility, creating enterprise-ready data and mobile device security controls becomes critical. There are some inherent benefits to creating corporate mobility – productivity, worker happiness, less end-point management – but there are also many concerns.

Mobile 243

Enterprise Meets Consumer Security: Exploring Approaches To Protect Employees At Home

Forrester IT

age of the customer cloud security content security cybersecurity data security endpoint security information security IoT security mobile security network security physical security privacy security & risk

BlueBox Security: Serving the corporate world by securing mobile data

CTOvision

Bluebox Security is saving the corporate world from information thievery by securing company data as it interacts with employee mobile devices & services. Company Security Companies bluebox Mobile device

Mobile 145

The Realities of Rural 5G Deployment in the US

Forrester IT

Early last week, Ajit Pai, the Chairman of the US Federal Communications Commission (FCC) announced his approval of the merger of T-Mobile and Sprint. This will result in a third mega-carrier in the US mobile wireless market, which is a good move for consumers like you and me.

Managing Mobile Business Insecurities

CTOvision

But with the escalation of smartphones, there is a proportionate security risk rise. Today about 75% of mobile apps fail the most basic security tests, and that number is probably going up not down. billion of mobile devices will have security applications installed.

Mobile 159

Mobile payments get Isaca’s security approval

Computer Weekly

Mobile contactless payments enable three key security controls that make them more secure than physical and e-commerce payments, according to a report by Isaca

Mobile 145

Real World Mobility – Filling the Gaps

Eric D. Brown

I just finished reading through the Dimension Data Secure Enterprise Mobility Report.The report is a nice report on how modern organizations are thinking about and approaching strategic planning with mobility, BYOD and security in mind. Sponsored by Dimension Data.

Mobile 234

The CTOvision Mobile App: Enterprise content on any mobile device

CTOvision

An upgrade for The CTOvision Mobile Application is available for iPhone , iPad and Android users. But we now include feeds from all other major tech blogs, letting you use our mobile app to track all the technology news, analysis and context you need.

Mobile 159

The Fight For Cybersecurity Brand Dominance Intensifies

Forrester IT

cybersecurity data security endpoint security IoT security managed security services providers (MSSPs) mobile security security & risk security automation & orchestration security operations & program governance endpoint detection and response IoT mobile Security & Risk

BlackBerry ends production of mobile phones

Computer Weekly

Canadian firm to focus on a strategy built around software development, including security and applications, and mobile device management

Mobile 206

MobileIron: Corporate IT policy and mobile device security are mismatched

Computer Weekly

MobileIron report identifies a gap between security policy and the actual deployment of that policy on mobile devices

Seven Mobile Security Threats to Watch

IT Toolbox

Let’s start with a real-world reminder of why mobile security is important. This past May, HospitalGown was uncovered by mobile security firm, Appthority. Billed as the largest enterprise mobile data leak ever, the vulnerability exposed more than 21,000 backend app server that

Mobile 100

The CTOvision Mobile App: The latest tech news and context on any mobile device

CTOvision

An upgrade for The CTOvision Mobile Application is available for iPhone , iPad and Android users. But we now include feeds from all other major tech blogs, letting you use our mobile app to track all the technology news, analysis and context you need.

Mobile 143

Look to over-the-top services to secure mobile, says specialist

Computer Weekly

Mobile network operators should look to 3G and 4G while enterprises should consider OTT services to provide the best security, says telecommunications industry veteran and pioneer Charles Brookson

Mobile C-level executives are major risk to business security

Computer Weekly

C-suite executives logging on to unsecured public Wi-Fi hotspots seem to present one of the biggest security risks to enterprise networks

Mobile 167

How the CIO can Sleuth Mobile Systems

CIO Dashboard

The responsibility of conducting mobile forensic investigations in the workplace should fall in the lap of the Chief Information Security Officer (CISO). Fetching data from mobile devices is fraught with challenges not found in the more mature realm of personal computers.

Mobile 100

The New Mobile Enterprise Reality

The Investing Edge

The statistics don’t lie: 2013 was the year of mobile. More than two billion mobile devices were shipped globally last year. Global mobile traffic now accounts for 15 percent of all internet traffic. Indeed, the mobility theme is not just a consumer phenomenon.

Mobile 130

How CIOs Deal With Mobile Disruption

The Accidental Successful CIO

Mobile disruptions can happen at any time Image Credit. As CIO, because of the importance of information technology, you need to get ready to deal with the disruptions that that arrival of even more mobile technology is going to create. It’s All About Security.

Mobile 194

The CTOvision Mobile App: Tech news and context on any mobile device

CTOvision

An upgrade for The CTOvision Mobile Application is available for iPhone , iPad and Android users. But we now include feeds from all other major tech blogs, letting you use our mobile app to track all the technology news, analysis and context you need.

Mobile 145

Mobile Application Security in 2016

Galido

And how do you feel about the security of the apps you install? Arxan recently did a 5th annual State of Application Security report, which takes an in-depth look into the security of some of the most popular mobile health and mobile finance applications available.

Four Best Practices for Mobile Enterprise Security

IT Toolbox

There is no denying the power of mobile devices and apps when it comes to improving efficiency and creating lower costs for business owners and employees in all industries. But, it’s also impossible to deny the possible security vulnerabilities that using mobile devices and applications for work can present. These tips will help you to ensure that your mobile environment is as secure as possible

Mobile 100

The importance of integrating mobile apps into your security program

IT Toolbox

We have witnessed niche-purpose mobile apps evolve into critical enterprise applications in recent years. From customer-facing functionality to core internal business workflows, these apps can not only improve the productivity of today’s mobile workforce, they can also present untold security vulnerabilities if they're not properly developed and vetted.

Cyber security a business necessity

Computer Weekly

Cyber security is a business necessity, according to the T-Mobile security chief in Poland

Mobile 204

Should You Build in-house or Outsource Development of Your Mobile Apps?

CTOvision

Once an enterprise has decided to go down the path of building native mobile apps, there is one critical decision involved –whether to build these apps in-house or to outsource development. If mobile is key to future growth, it is best to produce in-house. Sunil Thomas.

Mobile 172

The Cloud – Gateway to Enterprise Mobility

Eric D. Brown

The world of mobile ten years ago was one that was mobile, but wasn’t. The security issues that existed were fairly minor. Access via blackberry devices were fairly secure and straightforward. Today, mobility is much different in most organizations.

Mobile 163

New API improves security for mobile agent conversations

IT Toolbox

A new API goes live this week to power private text and voice conversations between customers and mobile workers. Developed by Twilio, it has been designed for any business with a mobile workforce, enabling workers to connect with clients using their own mobile device while also providing an additional level of privacy and security for both parties.

Mobile 100

Both Sides of Enterprise Mobility

Cloud Musings

Photo credit: Shutterstock Enterprise mobility has become table stakes in the world of business. The familiarity we all have with smartphones and wireless access, actually obscures the true difficulty of developing and executing an effective corporate mobile strategy.

Mobile 179

Video From Samsung Knox Press Conference at Mobile World Congress 2014

CTOvision

At this link and embedded below is a video from Samsung which captures the new features of Samsung’s well engineered approach to enhancing mobile security. By Bob Gourley.

Mobile 169

Mobile-Flex: Transformative Technology that simplifies mobile technology

CTOvision

Mobile-Flex® is a Windows Based Server solution that delivers access to any Windows server application on mobile devices, Windows desktops, Surface and Macintosh computers in a safe and secure manner using our patent pending technology that leaves NO trace of data of any nature on the device. We do this by dynamically analyzing each graphical object of the Windows Presentation Manager (WPM) and turn it into compressed images which are sent to the Mobil.

Mobile 110

Thriving in a Cloud, Big Data, Mobility and Security World

Cloud Musings

Cloud/Client Computing - The convergence of cloud and mobile computing will continue to promote the growth of centrally coordinated applications that can be delivered to any device. Software-defined networking, storage, data centers and security are maturing.

Fixmo Announces Expanded Collaboration with Samsung, Enhanced Support for Samsung KNOX Secure Mobile Platform

CTOvision

Fixmo Announces Expanded Collaboration with Samsung, Enhanced Support for Samsung KNOX Secure Mobile Platform. Today at Mobile World Congress, Fixmo announces the expansion of its collaboration with Samsung, the world’s largest smartphone manufacturer.

Mobile 137

Why your CTO Makes or Breaks your Enterprise Mobile Strategy

CTOvision

Why your CTO Makes or Breaks your Enterprise Mobile Strategy. For consumers, mobile phone adoption has skyrocketed and smartphone ownership continues to climb in emerging economies. Plus, 90% of mobile users time is spent in apps. Scalability & Security. Sunil Thomas.

Mobile 123

Mobile App Development in the Enterprise: What’s Next?

The Investing Edge

Mobile apps are expected to drive more than $38 billion in revenue by 2015, and enterprises have joined the cause. Our two previous forums were great successes, tackling the issues of cloud security and enterprise IT sales , respectively.

Mobile 176