Mobile security News
September 13, 2017
Apple announced the new iPhone X Face ID system, which replaces Touch ID in favor of facial recognition and may offer 20 times fewer false positives than fingerprint scanning.
July 28, 2017
Application security expert Michael Cobb discusses the Samsung Knox platform and its ability to improve Android device security in the enterprise.
May 22, 2017
Google last week announced Android security features that continue to heighten the company's enterprise mobility game. Enterprise security features from the big mobile operating systems, Google ...
April 18, 2017
Innovative mobile security technology has been developed to offset vulnerabilities, but using cutting-edge solutions such as automation could come back to haunt IT execs.
Mobile security Get Started
Bring yourself up to speed with our introductory content
Expert contributor Ed Tittel takes a look at Trend Micro OfficeScan, an endpoint protection product with antivirus and antimalware functionality for physical and virtualized endpoints. Continue Reading
Walk the corridors of any modern hospital, from intensive care to patient units to emergency rooms, and you'll see the familiar banks of workstations where doctors and nurses busily access patient records and type in critical updates. For years, those stationary desktops have been the lifeblood of patient care. And while laptops have given caregivers some degree of mobility, "nobody wants to carry around a 4.5-pound laptop all day," one hospital CIO says. Doctors and nurses looking for mobile in healthcare to engage patients inside and outside the hospital may find a cure in small tablets, and they don't require a prescription.
Our cover story examines the infiltration of digital tablets and smartphones in healthcare as seen through the eyes of hospital CIOs. Some CIOs view mobile in healthcare as vastly "underdeveloped," "disjointed" and "clunky," with a "long way to go," not to mention the integration and security nightmares mobile devices can create for IT professionals. But CIOs also see the day when mobile devices will be a seamless and invisible part of healthcare and vastly improve patient care and engagement. That's already happening in some healthcare facilities where the distinction between tablets, laptops and even workstations is disappearing, as described in another feature. In addition to becoming fixtures in hospitals and outpatient clinics, tablets are finding a home in remote patient monitoring and achieving a level of sophistication that allows doctors and radiologists to view complex medical images anytime, anywhere.
This issue also covers several options for maintaining the security of mobile in healthcare, including identity protection, mobile app management, and advanced auditing and tracking techniques.Continue Reading
The old username/password combination is not the safest form of ID management. See why two-factor authentication belongs in IT's mobile security arsenal and learn how to set it up. Continue Reading
Evaluate Mobile security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
A number of vendors offer MADP software, so buyers must carefully assess and compare the options to see which tool can most effectively build and deploy their enterprise apps. Continue Reading
Expert Bill Hayes checks out the Symantec Data Loss Prevention suite, featuring an architecture consisting of content-aware detection servers, endpoint agents and unified management. Continue Reading
When considering mobile security, think of blockchain. Follow these tips to determine whether the security attributes of blockchain could be of benefit to your organization. Continue Reading
Manage Mobile security
Learn to apply best practices and optimize your operations.
Take your mobile security strategy beyond mobile device management. IT can keep data and devices safe with the latest technologies, such as identity management and access control. Continue Reading
With so many mobile security challenges around the bend, admins may worry they'll never see the finish line. IT can achieve security success by staying ahead of the curve. Continue Reading
IT admins need to have eyes in the back of their heads when it comes to keeping track of who is trying to access company data. That's where an ID management system comes in. Continue Reading
Problem Solve Mobile security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
In this excerpt from chapter 11 of Mobile Security and Privacy, authors Raymond Choo and Man Ho Au discuss privacy and anonymity in terms of mathematics. Continue Reading
In this excerpt from chapter 10 of Handbook of System Safety and Security, editor Edward Griffor discusses cloud and mobile cloud architecture and security. Continue Reading
Do you know the significance of changing from a four-digit passcode to a six-digit one? Test all your IT knowledge on this mobile security quiz. Continue Reading