New & Notable
Wireless and mobile security News
June 02, 2021
Microsoft has bought ReFirm Labs in an IoT security play. The company said Refirm's open source-based products would help it address firmware vulnerabilities in IoT devices.
February 28, 2020
Experts at RSA 2020 said the United States and its allies have to solve trade disputes and combine resources to secure global 5G infrastructure against Chinese threats.
February 27, 2020
At the RSA 2020 conference, experts said enterprise-class 5G services are years away. Obstacles include security and doubts about profitability.
January 29, 2020
OpenText's chief product officer discusses how the recently acquired Carbonite -- which had recently acquired Webroot -- fits into the content services provider's product roadmap.
Wireless and mobile security Get Started
Bring yourself up to speed with our introductory content
Visitor-based networking (VBN) is a computer network with high-speed internet access provided by an organization for temporary use by visitors, guests or other users in a public area. Continue Reading
Customer proprietary network information (CPNI) in the United States is information that telecommunications services -- such as local, long-distance and wireless telephone companies -- acquire about their subscribers. Continue Reading
Secure mobile apps by engineering security right into the software and with thorough mobile app security testing. Here's what risks to look for, processes to use and tools to adopt. Continue Reading
Evaluate Wireless and mobile security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Mobile device management and mobile application management do different things but also overlap. Knowing their differences is important. Continue Reading
In the U.S.-China competition over 5G, the infrastructure deployment race sets the stage for a larger struggle over the application layer. Here's why enterprise IT teams should care. Continue Reading
The trend of mobile device convergence, adding more functionality to smaller hybrid devices, is growing in intensity with the COVID-19 pandemic, and IT must be prepared for it. Continue Reading
Manage Wireless and mobile security
Learn to apply best practices and optimize your operations.
Adequate mobile app security must assess various dimensions of software, including each OS's best practices, traffic and API calls, data storage and source code. Continue Reading
Building a data protection strategy around remote working requires companies to enable employee access to data while ensuring that it is protected from threats such as shadow IT. Continue Reading
The policies organizations should deploy for BYOD devices compared to kiosk devices are very different. Learn how organizations should approach these policy decisions. Continue Reading
Problem Solve Wireless and mobile security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Cybercriminals have several methods at their disposal to hack and exploit credit card information. Learn about these, how to prevent them and what to do when hacked. Continue Reading
Many organizations have employees working from home, but some may not have taken the security and training precautions that remote work requires. Continue Reading
Android is just as secure as its competitors' OSes, but IT should still remain vigilant. Here are three ways to secure Android devices for the enterprise. Continue Reading