The mobile workforce has arrived, and employees everywhere are leveraging the convenience of their smartphones and tablets. But while workers enjoy the freedom of being slightly less tethered to their desks, IT minds the security risks.
Mobile device management (MDM) lets IT be the voice of reason while granting...
This IDC study analyzes the enterprise mobility management (EMM) market in 2015. In addition to ranking of the top 14 vendors by revenue, it provides an overview of key market trends and events that helped shape the market landscape in 2015.
To better mitigate the breach risks tied to the growing use of mobile devices, organizations need to adopt enterprise digital rights management as a way to improve data security, says Gartner's John Girard.
A UAE-based activist targeted by a rare and valuable remote exploit for Apple's mobile software has caused concern over the continued sale of powerful spying tools to governments with poor human rights records.
Security firms are warning that they've seen a spike in infections tied to a virulent strain of trojanized Android adware called Shedun - a.k.a. HummingBad - that can root smartphones, survive factory resets and earn cybercriminals big money.
More than half of all Android smartphones have a flaw that can be exploited to bypass the devices' full-disk encryption. As a result, law enforcement agencies - or attackers - could access all supposedly encrypted data being stored on vulnerable devices.
Some 85 percent of the mobile banking apps in the Asia-Pacific region fail basic security checks, according to a recent study by AppKnox. Experts outline the challenges faced by banks in securing mobile apps and share some recommendations.
IBM's Vaidyanathan Iyer says security practitioners need new tactics to bridge the skills gap and fight emerging threats. He suggests the use of analytics and machine learning would easily help fill the gap in detecting threats.
Ransomware, regulations, botnets, information sharing and policing strategies were just some of the topics that dominated the "International Conference on Big Data in Cyber Security" hosted by Edinburgh Napier University in Scotland.
In revised guidance, the National Institute of Standards and Technology cautions enterprises to assume that "external environments contain hostile threats" as they establish programs to allow employees and contractors to remotely access critical systems.
Today's IT solutions increasingly leverage multiple heterogeneous platforms including mobile and cloud for mission-critical applications. With these businesses face an ever more challenging landscape and tighter regulatory controls in order to protect their brands and meet the demands of the marketplace. Today's...
The Gartner Magic Quadrant is one of the most influential research tools that IT buyers use to evaluate vendors and keep pace with the accelerating shift from Mobile Device Management activity to Enterprise Mobility Management (EMM) strategy.
Ten years ago the smart phone, and a few years later the tablet, changed...
As more banks and government agencies stop providing free BlackBerries to employees, the beleaguered smartphone manufacturer is attempting to reboot with the launch of its first Android smartphone, dubbed Priv for privacy.
Mobile computing remains a challenge for many enterprises - with an unprecedented explosion of devices and applications. Understanding diversity, avoiding uncertainty and planning ahead are some suggestions from Gartner's John Girard.
In evaluating current or future BYOD policies and deployments, it's important to recognize that your industry
regulations, employee needs and company culture should play a significant role in determining how your
company enables BYOD. One approach does not suit all companies. Even within a company, you may...