Three Essential Mobile Security Measures

CTOvision

Read Andrew Hoog explain the three essential mobile security measures every company should adopt on DZone Blog : Many of us have heard of the 80/20 rule, also known as the ‘Pareto Principle.’ Applied to mobile application security, the idea is that guarding against threats with the greatest potential impact can mitigate 80 percent of […]. Cyber Security News

Mobile 210

BlueBox Security: Serving the corporate world by securing mobile data

CTOvision

Bluebox Security is saving the corporate world from information thievery by securing company data as it interacts with employee mobile devices & services. Company Security Companies bluebox Mobile device

Mobile 311

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

8 Tips for More Secure Mobile Computing

CTOvision

Security professionals often talk about the importance of enlisting users as allies in the battle for better security. When it comes to mobile security, that alliance must be a working reality rather than a managerial dream — namely because these handheld machines are typically employee-owned, thus placing their use and precise configuration out of the […].

Mobile 192

Managing Mobile Business Insecurities

CTOvision

But with the escalation of smartphones, there is a proportionate security risk rise. Today about 75% of mobile apps fail the most basic security tests, and that number is probably going up not down. billion of mobile devices will have security applications installed.

Mobile 342

Enterprise Meets Consumer Security: Exploring Approaches To Protect Employees At Home

Forrester IT

age of the customer cloud security content security cybersecurity data security endpoint security information security IoT security mobile security network security physical security privacy security & risk

Mobilize The Internet Of Things

Forrester IT

The mobile mind shift requires businesses to proactively support these IoT benefits for nonstationary connected objects that exist as part of IoT solutions. In particular, the IoT forces businesses to acquaint themselves with the implications of mobility in the IoT context for connectivity, security, compliance with privacy and other regulations, and data management for mobility. This means that: Mobile technologies are central to most IoT solutions. Mobility.

The CTOvision Mobile App: Enterprise content on any mobile device

CTOvision

An upgrade for The CTOvision Mobile Application is available for iPhone , iPad and Android users. But we now include feeds from all other major tech blogs, letting you use our mobile app to track all the technology news, analysis and context you need.

Mobile 341

Navigating the European 5G Security Debate

Forrester IT

Some mobile operators in the UK recently have had a bit of a bumpy ride with spotty coverage and outages experienced […]. age of the customer IoT security network security security & risk security architecture zero trust security framework (ZTX

The CTOvision Mobile App: The latest tech news and context on any mobile device

CTOvision

An upgrade for The CTOvision Mobile Application is available for iPhone , iPad and Android users. But we now include feeds from all other major tech blogs, letting you use our mobile app to track all the technology news, analysis and context you need.

Mobile 305

The CTOvision Mobile App: Tech news and context on any mobile device

CTOvision

An upgrade for The CTOvision Mobile Application is available for iPhone , iPad and Android users. But we now include feeds from all other major tech blogs, letting you use our mobile app to track all the technology news, analysis and context you need.

Mobile 311

The Fight For Cybersecurity Brand Dominance Intensifies

Forrester IT

cybersecurity data security endpoint security IoT security managed security services providers (MSSPs) mobile security security & risk security automation & orchestration security operations & program governance endpoint detection and response IoT mobile Security & Risk

Creating Enterprise Data and Mobility Security

Data Center Knowledge

As more users utilize mobility, creating enterprise-ready data and mobile device security controls becomes critical. There are some inherent benefits to creating corporate mobility – productivity, worker happiness, less end-point management – but there are also many concerns.

Mobile 239

Gartner Top 9 Security and Risk Trends for 2020

CEB IT

The shortage of technical security staff, the rapid migration to cloud computing, regulatory compliance requirements and the unrelenting evolution of threats continue to be the most significant ongoing major security challenges. Security

Trends 311

Should You Build in-house or Outsource Development of Your Mobile Apps?

CTOvision

Once an enterprise has decided to go down the path of building native mobile apps, there is one critical decision involved –whether to build these apps in-house or to outsource development. If mobile is key to future growth, it is best to produce in-house. Sunil Thomas.

Mobile 368

Mobile-Flex: Transformative Technology that simplifies mobile technology

CTOvision

Mobile-Flex® is a Windows Based Server solution that delivers access to any Windows server application on mobile devices, Windows desktops, Surface and Macintosh computers in a safe and secure manner using our patent pending technology that leaves NO trace of data of any nature on the device. We do this by dynamically analyzing each graphical object of the Windows Presentation Manager (WPM) and turn it into compressed images which are sent to the Mobil.

Mobile 235

Video From Samsung Knox Press Conference at Mobile World Congress 2014

CTOvision

At this link and embedded below is a video from Samsung which captures the new features of Samsung’s well engineered approach to enhancing mobile security. By Bob Gourley.

Mobile 361

Fixmo Announces Expanded Collaboration with Samsung, Enhanced Support for Samsung KNOX Secure Mobile Platform

CTOvision

Fixmo Announces Expanded Collaboration with Samsung, Enhanced Support for Samsung KNOX Secure Mobile Platform. Today at Mobile World Congress, Fixmo announces the expansion of its collaboration with Samsung, the world’s largest smartphone manufacturer.

Mobile 292

SafeWatch Mobile Security Solution by @Fixmo Now in General Availability for Android and iOS

CTOvision

–(BUSINESS WIRE)–Fixmo, a leader in mobile security and data protection solutions, today announced the general availability of Fixmo SafeWatch, an innovative mobile privacy and security solution for consumers and business professionals using Android and iOS smartphones.

Mobile 289

DISA Announces DoD Mobility Capability Enhancements for Android/Samsung Knox

CTOvision

The following was just announced by the Defense Information Systems Agency (DISA): DISA ANNOUNCES DOD MOBILITY CAPABILITY, 2.0 The Defense Information Systems Agency (DISA), as the lead agency for the DOD Mobility Capability, implemented its 2.0 release for Android/Samsung Knox capability under the DOD Mobility Unclassified Capability (DMUC) […]. Cyber Security Government Mobile Android Bluetooth DISA KNOX Mobile Device Management samsung Samsung Galaxy S4 Wi-Fi

Mobile 262

Why your CTO Makes or Breaks your Enterprise Mobile Strategy

CTOvision

Why your CTO Makes or Breaks your Enterprise Mobile Strategy. For consumers, mobile phone adoption has skyrocketed and smartphone ownership continues to climb in emerging economies. Plus, 90% of mobile users time is spent in apps. Scalability & Security. Sunil Thomas.

Mobile 265

Mobile Application Security in 2016

Galido

And how do you feel about the security of the apps you install? Arxan recently did a 5th annual State of Application Security report, which takes an in-depth look into the security of some of the most popular mobile health and mobile finance applications available.

Mobile payments get Isaca’s security approval

Computer Weekly

Mobile contactless payments enable three key security controls that make them more secure than physical and e-commerce payments, according to a report by Isaca

Mobile 144

Area 1 Security raises $25 million for AI tools to protect against phishing

Venture Beast

Area 1 Security, a cybersecurity vendor whose products leverage AI and machine learning to protect against phishing, has raised $25 million. Read More.

Tools 103

Fixmo: The Mobile Risk Management Company

CTOvision

Company Mobile Companies Security Companies You''re unauthorized to view this page. Why don''t you Login and try again.

The CTOvision Mobile App: Updated to include events plus tech news and videos

CTOvision

An upgrade for The CTOvision Mobile Application is available for iPhone , iPad and Android users. But we now include feeds from all other major tech blogs, letting you use our mobile app to track all the technology news, analysis and context you need. By Bob Gourley.

Mobile 318

Freedom Mobile data breach impacts thousands of customers

CTOvision

Freedom Mobile, a major Canadian telecommunications provider, has revealed a data breach which may have exposed sensitive information belonging to thousands of customers. Cyber Security NewsOn Tuesday, cybersecurity researchers Noam Rotem and Ran Locar from vpnMentor said they were able to access a database belonging to Canada’s fourth-largest telco, which was “totally unprotected and unencrypted.” ” The database contained […].

Mobile 195

Dish now owns Boost Mobile, following sale from T-Mobile

The Verge

Dish now owns Boost Mobile, bringing Dish — after years of speculation — into the consumer wireless market where it can start to compete with Verizon, AT&T, and T-Mobile. Boost was previously part of Sprint, which is now owned by T-Mobile. Image: Dish.

7 Security Areas to Focus on During COVID-19

CEB IT

Now that many workers have shifted to working remotely and organizations are distracted trying to handle the virus, security and risk management teams need to be more vigilant than ever. Most of the security and risk team is now operating in completely different environments and mindsets.

If Mobile Isn’t On Your Radar, It Should Be

CTOvision

Editor's note: In this post, AIIM ’s CEO John Mancini urges enterprises to take a serious look at mobile ECM as their window on content. -bg. Enterprises understand that there is a natural synergy between mobile services and mobile content. Yet despite this, many are being slow at putting effective mobile programs in place to satisfy the 24/7 connected business world. Only 10 percent of those interviewed said they thought they had a successful mobile program in place.

Mobile 304

DISA Announces Initial Release v1.0 of DoD Unclassified Mobility Capability

CTOvision

By Bob Gourley Editor’s note: The release below from the Defense Information Systems Agency points to progress enabling several key DoD missions with mobility solutions. MEADE, Md. – The new year will bring new mobile capabilities to as many as 100,000 DOD users. of the unclassified mobility capability Jan. The program currently supports 1,800 unclassified mobile devices including iPad 3 and 4, iPhone 4S and 5, Samsung 10.1

Mobile 238

Real World Mobility – Filling the Gaps

Eric D. Brown

I just finished reading through the Dimension Data Secure Enterprise Mobility Report.The report is a nice report on how modern organizations are thinking about and approaching strategic planning with mobility, BYOD and security in mind. Sponsored by Dimension Data.

Mobile 235

Android Agent Smith mobile malware hits millions of devices

CTOvision

Mobile malware dubbed Agent Smith has infected about 25 million devices, mainly in India and other Asian countries, but other countries have also been affected, including the UK and US, according to security researchers at Check Point Software Technologies.

Boosting Mobile Reception in the Office

Galido

Information Technology Blog - - Boosting Mobile Reception in the Office - Information Technology Blog. Technology has placed mobile devices at the forefront of work, leisure, entertainment, and other forms of content. Mobile

AirPatrol: Cognitive Mobility and Wireless Situational Awareness.

CTOvision

AirPatrol delivers the first intelligent enterprise mobility solution that continuously monitors mobile devices and dynamically adapts their capabilities for the situation. AirPatrol operates under the premise that in security location is everything. Company Cyber Security Mobile Security Companies AirPatrol mobile ZoneDefense

The Threat Brief Mobile App: Know the threat to beat the threat

CTOvision

Threat Brief Mobile App is now available for all Apple iOS and Android devices. To find it search for ThreatBrief in your favorite app store, or follow these links: The Threat Brief Mobile App For iOS . The Threat Brief Mobile App for Android. Bob Gourley.

Mobile 238

MobileIron: Corporate IT policy and mobile device security are mismatched

Computer Weekly

MobileIron report identifies a gap between security policy and the actual deployment of that policy on mobile devices

BlackBerry ends production of mobile phones

Computer Weekly

Canadian firm to focus on a strategy built around software development, including security and applications, and mobile device management

Mobile 205

Seven Mobile Security Threats to Watch

IT Toolbox

Let’s start with a real-world reminder of why mobile security is important. This past May, HospitalGown was uncovered by mobile security firm, Appthority. Billed as the largest enterprise mobile data leak ever, the vulnerability exposed more than 21,000 backend app server that

Mobile 100

The CTOvision Mobile App: Track tech topics anywhere anytime on iOS and Android

CTOvision

The CTOvision Mobile application provides intuitive, interactive access to our content and easy ways to find and share the information you and your network need to know on enterprise tech. Here are the download sites for the CTOvision Mobile App: iPhone. Bob Gourley.

Mobile 227

Try The Upgraded CTOvision Mobile Application for iPhone, iPad and Android

CTOvision

An upgrade for The CTOvision Mobile Application is available for iPhone , iPad and Android users. Here are the download sites for the CTOvision Mobile App: iPhone. Analysis Big Data CTO Cyber Security DoD and IC Events Mobile Android Google Play ipad IPhone Twitter

Mobile 332

Work Hard. At Not Getting Your Phone Compromised

Forrester IT

The recent news concerning the hacking of Amazon CEO Jeff Bezos’ mobile phone demonstrates that corporate executives are perfectly legitimate collection targets for governments. age of the customer security & risk data breach employee experience executive security mobile strategy Security & Risk

Look to over-the-top services to secure mobile, says specialist

Computer Weekly

Mobile network operators should look to 3G and 4G while enterprises should consider OTT services to provide the best security, says telecommunications industry veteran and pioneer Charles Brookson

What Are the Steps Involved in Mobile App Testing Process?

Galido

Information Technology Blog - - What Are the Steps Involved in Mobile App Testing Process? We can find a mobile application for just about everything. If mobile apps were initially restricted to entertainment, in the current scenario, they are being used for all purposes.