Mobile security News
July 28, 2017
Application security expert Michael Cobb discusses the Samsung Knox platform and its ability to improve Android device security in the enterprise.
May 22, 2017
Google last week announced Android security features that continue to heighten the company's enterprise mobility game. Enterprise security features from the big mobile operating systems, Google ...
April 18, 2017
Innovative mobile security technology has been developed to offset vulnerabilities, but using cutting-edge solutions such as automation could come back to haunt IT execs.
April 05, 2017
MAM provider Apperian looks to take advantage of a larger support staff and new mobile application security technology following its acquisition by Arxan.
Mobile security Get Started
Bring yourself up to speed with our introductory content
Expert contributor Ed Tittel takes a look at Trend Micro OfficeScan, an endpoint protection product with antivirus and antimalware functionality for physical and virtualized endpoints. Continue Reading
Walk the corridors of any modern hospital, from intensive care to patient units to emergency rooms, and you'll see the familiar banks of workstations where doctors and nurses busily access patient records and type in critical updates. For years, those stationary desktops have been the lifeblood of patient care. And while laptops have given caregivers some degree of mobility, "nobody wants to carry around a 4.5-pound laptop all day," one hospital CIO says. Doctors and nurses looking for mobile in healthcare to engage patients inside and outside the hospital may find a cure in small tablets, and they don't require a prescription.
Our cover story examines the infiltration of digital tablets and smartphones in healthcare as seen through the eyes of hospital CIOs. Some CIOs view mobile in healthcare as vastly "underdeveloped," "disjointed" and "clunky," with a "long way to go," not to mention the integration and security nightmares mobile devices can create for IT professionals. But CIOs also see the day when mobile devices will be a seamless and invisible part of healthcare and vastly improve patient care and engagement. That's already happening in some healthcare facilities where the distinction between tablets, laptops and even workstations is disappearing, as described in another feature. In addition to becoming fixtures in hospitals and outpatient clinics, tablets are finding a home in remote patient monitoring and achieving a level of sophistication that allows doctors and radiologists to view complex medical images anytime, anywhere.
This issue also covers several options for maintaining the security of mobile in healthcare, including identity protection, mobile app management, and advanced auditing and tracking techniques.Continue Reading
The old username/password combination is not the safest form of ID management. See why two-factor authentication belongs in IT's mobile security arsenal and learn how to set it up. Continue Reading
Evaluate Mobile security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Take your mobile security strategy beyond mobile device management. IT can keep data and devices safe with the latest technologies, such as identity management and access control. Continue Reading
For competitive businesses, mobility is a must-have. But without the proper security to go with it, mobile data is susceptible to cyberattacks and more. Continue Reading
Mobile application assessments can help enterprises decide which apps to allow, improving security. Christopher Crowley of the SANS Institute discusses how to use app assessments. Continue Reading
Manage Mobile security
Learn to apply best practices and optimize your operations.
With so many mobile security challenges around the bend, admins may worry they'll never see the finish line. IT can achieve security success by staying ahead of the curve. Continue Reading
IT admins sometimes need to have eyes in the back of their heads when it comes to keeping track of who is trying to access company data. That's where ID management comes in. Continue Reading
As mobile security threats arise, the need for identity management systems becomes more and more crucial. The right tools help IT protect company data and users alike. Continue Reading
Problem Solve Mobile security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
In this excerpt from chapter 11 of Mobile Security and Privacy, authors Raymond Choo and Man Ho Au discuss privacy and anonymity in terms of mathematics. Continue Reading
In this excerpt from chapter 10 of Handbook of System Safety and Security, editor Edward Griffor discusses cloud and mobile cloud architecture and security. Continue Reading
Do you know the significance of changing from a four-digit passcode to a six-digit one? Test all your IT knowledge on this mobile security quiz. Continue Reading