Three Essential Mobile Security Measures

CTOvision

Read Andrew Hoog explain the three essential mobile security measures every company should adopt on DZone Blog : Many of us have heard of the 80/20 rule, also known as the ‘Pareto Principle.’ Applied to mobile application security, the idea is that guarding against threats with the greatest potential impact can mitigate 80 percent of […]. Cyber Security News

Mobile 139

BlueBox Security: Serving the corporate world by securing mobile data

CTOvision

Bluebox Security is saving the corporate world from information thievery by securing company data as it interacts with employee mobile devices & services. Company Security Companies bluebox Mobile device

Mobile 205

Managing Mobile Business Insecurities

CTOvision

But with the escalation of smartphones, there is a proportionate security risk rise. Today about 75% of mobile apps fail the most basic security tests, and that number is probably going up not down. billion of mobile devices will have security applications installed.

Mobile 224

The Realities of Rural 5G Deployment in the US

Forrester IT

Early last week, Ajit Pai, the Chairman of the US Federal Communications Commission (FCC) announced his approval of the merger of T-Mobile and Sprint. This will result in a third mega-carrier in the US mobile wireless market, which is a good move for consumers like you and me.

Creating Enterprise Data and Mobility Security

Data Center Knowledge

As more users utilize mobility, creating enterprise-ready data and mobile device security controls becomes critical. There are some inherent benefits to creating corporate mobility – productivity, worker happiness, less end-point management – but there are also many concerns.

Mobile 243

The CTOvision Mobile App: Enterprise content on any mobile device

CTOvision

An upgrade for The CTOvision Mobile Application is available for iPhone , iPad and Android users. But we now include feeds from all other major tech blogs, letting you use our mobile app to track all the technology news, analysis and context you need.

Mobile 224

The CTOvision Mobile App: The latest tech news and context on any mobile device

CTOvision

An upgrade for The CTOvision Mobile Application is available for iPhone , iPad and Android users. But we now include feeds from all other major tech blogs, letting you use our mobile app to track all the technology news, analysis and context you need.

Mobile 202

Mobile payments get Isaca’s security approval

Computer Weekly

Mobile contactless payments enable three key security controls that make them more secure than physical and e-commerce payments, according to a report by Isaca

Mobile 145

The CTOvision Mobile App: Tech news and context on any mobile device

CTOvision

An upgrade for The CTOvision Mobile Application is available for iPhone , iPad and Android users. But we now include feeds from all other major tech blogs, letting you use our mobile app to track all the technology news, analysis and context you need.

Mobile 205

How CIOs Deal With Mobile Disruption

The Accidental Successful CIO

Mobile disruptions can happen at any time Image Credit. As CIO, because of the importance of information technology, you need to get ready to deal with the disruptions that that arrival of even more mobile technology is going to create. It’s All About Security.

Mobile 191

Freedom Mobile data breach impacts thousands of customers

CTOvision

Freedom Mobile, a major Canadian telecommunications provider, has revealed a data breach which may have exposed sensitive information belonging to thousands of customers. Cyber Security NewsOn Tuesday, cybersecurity researchers Noam Rotem and Ran Locar from vpnMentor said they were able to access a database belonging to Canada’s fourth-largest telco, which was “totally unprotected and unencrypted.” ” The database contained […].

Should You Build in-house or Outsource Development of Your Mobile Apps?

CTOvision

Once an enterprise has decided to go down the path of building native mobile apps, there is one critical decision involved –whether to build these apps in-house or to outsource development. If mobile is key to future growth, it is best to produce in-house. Sunil Thomas.

Mobile 243

Both Sides of Enterprise Mobility

Cloud Musings

Photo credit: Shutterstock Enterprise mobility has become table stakes in the world of business. The familiarity we all have with smartphones and wireless access, actually obscures the true difficulty of developing and executing an effective corporate mobile strategy.

Mobile 179

Seven Mobile Security Threats to Watch

IT Toolbox

Let’s start with a real-world reminder of why mobile security is important. This past May, HospitalGown was uncovered by mobile security firm, Appthority. Billed as the largest enterprise mobile data leak ever, the vulnerability exposed more than 21,000 backend app server that

Mobile 100

BlackBerry ends production of mobile phones

Computer Weekly

Canadian firm to focus on a strategy built around software development, including security and applications, and mobile device management

Mobile 206

MobileIron: Corporate IT policy and mobile device security are mismatched

Computer Weekly

MobileIron report identifies a gap between security policy and the actual deployment of that policy on mobile devices

The Fight For Cybersecurity Brand Dominance Intensifies

Forrester IT

cybersecurity data security endpoint security IoT security managed security services providers (MSSPs) mobile security security & risk security automation & orchestration security operations & program governance endpoint detection and response IoT mobile Security & Risk

Thriving in a Cloud, Big Data, Mobility and Security World

Cloud Musings

Cloud/Client Computing - The convergence of cloud and mobile computing will continue to promote the growth of centrally coordinated applications that can be delivered to any device. Software-defined networking, storage, data centers and security are maturing.

Mobile-Flex: Transformative Technology that simplifies mobile technology

CTOvision

Mobile-Flex® is a Windows Based Server solution that delivers access to any Windows server application on mobile devices, Windows desktops, Surface and Macintosh computers in a safe and secure manner using our patent pending technology that leaves NO trace of data of any nature on the device. We do this by dynamically analyzing each graphical object of the Windows Presentation Manager (WPM) and turn it into compressed images which are sent to the Mobil.

Mobile 155

Video From Samsung Knox Press Conference at Mobile World Congress 2014

CTOvision

At this link and embedded below is a video from Samsung which captures the new features of Samsung’s well engineered approach to enhancing mobile security. By Bob Gourley.

Mobile 238

Fixmo Announces Expanded Collaboration with Samsung, Enhanced Support for Samsung KNOX Secure Mobile Platform

CTOvision

Fixmo Announces Expanded Collaboration with Samsung, Enhanced Support for Samsung KNOX Secure Mobile Platform. Today at Mobile World Congress, Fixmo announces the expansion of its collaboration with Samsung, the world’s largest smartphone manufacturer.

Mobile 193

Why your CTO Makes or Breaks your Enterprise Mobile Strategy

CTOvision

Why your CTO Makes or Breaks your Enterprise Mobile Strategy. For consumers, mobile phone adoption has skyrocketed and smartphone ownership continues to climb in emerging economies. Plus, 90% of mobile users time is spent in apps. Scalability & Security. Sunil Thomas.

Mobile 174

Look to over-the-top services to secure mobile, says specialist

Computer Weekly

Mobile network operators should look to 3G and 4G while enterprises should consider OTT services to provide the best security, says telecommunications industry veteran and pioneer Charles Brookson

Mobile C-level executives are major risk to business security

Computer Weekly

C-suite executives logging on to unsecured public Wi-Fi hotspots seem to present one of the biggest security risks to enterprise networks

Mobile 167

Mobile device security: A new frontier for hackers

Cloud Musings

Recent security breaches have heightened our awareness of cybersecurity issues. The hack and other security breaches have resulted in unprecedented damages. However, the majority of mobile device users have yet to be sensitized to their personal and corporate security risks.

Mobile 200

DISA Announces DoD Mobility Capability Enhancements for Android/Samsung Knox

CTOvision

The following was just announced by the Defense Information Systems Agency (DISA): DISA ANNOUNCES DOD MOBILITY CAPABILITY, 2.0 The Defense Information Systems Agency (DISA), as the lead agency for the DOD Mobility Capability, implemented its 2.0 release for Android/Samsung Knox capability under the DOD Mobility Unclassified Capability (DMUC) […]. Cyber Security Government Mobile Android Bluetooth DISA KNOX Mobile Device Management samsung Samsung Galaxy S4 Wi-Fi

Mobile 172

SafeWatch Mobile Security Solution by @Fixmo Now in General Availability for Android and iOS

CTOvision

–(BUSINESS WIRE)–Fixmo, a leader in mobile security and data protection solutions, today announced the general availability of Fixmo SafeWatch, an innovative mobile privacy and security solution for consumers and business professionals using Android and iOS smartphones.

Mobile 193

How the CIO can Sleuth Mobile Systems

CIO Dashboard

The responsibility of conducting mobile forensic investigations in the workplace should fall in the lap of the Chief Information Security Officer (CISO). Fetching data from mobile devices is fraught with challenges not found in the more mature realm of personal computers.

Mobile 100

The New Mobile Enterprise Reality

The Investing Edge

The statistics don’t lie: 2013 was the year of mobile. More than two billion mobile devices were shipped globally last year. Global mobile traffic now accounts for 15 percent of all internet traffic. Indeed, the mobility theme is not just a consumer phenomenon.

Mobile 130

Four Best Practices for Mobile Enterprise Security

IT Toolbox

There is no denying the power of mobile devices and apps when it comes to improving efficiency and creating lower costs for business owners and employees in all industries. But, it’s also impossible to deny the possible security vulnerabilities that using mobile devices and applications for work can present. These tips will help you to ensure that your mobile environment is as secure as possible

Mobile 100

The importance of integrating mobile apps into your security program

IT Toolbox

We have witnessed niche-purpose mobile apps evolve into critical enterprise applications in recent years. From customer-facing functionality to core internal business workflows, these apps can not only improve the productivity of today’s mobile workforce, they can also present untold security vulnerabilities if they're not properly developed and vetted.

The CTOvision Mobile App: Updated to include events plus tech news and videos

CTOvision

An upgrade for The CTOvision Mobile Application is available for iPhone , iPad and Android users. But we now include feeds from all other major tech blogs, letting you use our mobile app to track all the technology news, analysis and context you need. By Bob Gourley.

Mobile 210

Fixmo: The Mobile Risk Management Company

CTOvision

Company Mobile Companies Security Companies You''re unauthorized to view this page. Why don''t you Login and try again.

Cyber security a business necessity

Computer Weekly

Cyber security is a business necessity, according to the T-Mobile security chief in Poland

Mobile 204

If Mobile Isn’t On Your Radar, It Should Be

CTOvision

Editor's note: In this post, AIIM ’s CEO John Mancini urges enterprises to take a serious look at mobile ECM as their window on content. -bg. Enterprises understand that there is a natural synergy between mobile services and mobile content. Yet despite this, many are being slow at putting effective mobile programs in place to satisfy the 24/7 connected business world. Only 10 percent of those interviewed said they thought they had a successful mobile program in place.

Mobile 202