Skip the navigation

More Mobile Security In Depth

Mobile security: A mother lode of new tools

A gold rush of next-gen authentication technologies yields biometric systems, ID bracelets, new standards and more. Insider (registration required)

BYOD morphs from lockdown to true mobility

Four companies that have been at BYOD for a while talk about how their programs have changed with the times. One key takeaway: Don't expect to save bundles of money. Insider (registration required)

How to keep your smartphone (and its data) secure

We keep a large amount of personal and business data on our smartphones and tablets; here are some tips and tricks to help you protect both your hardware and your information.

7 all-in-one security suites: Anti-malware for all your devices

Today's security suites try to protect all (or most) of your devices, and provide Web-based management. We examine how seven major applications compare in terms of features, ease of use and which devices they actually protect.

Kenneth van Wyk: Where mobile apps go wrong

More so than Web-based applications, mobile apps tend to have security design flaws that attackers can exploit. (Insider; registration required)

Evan Schuman: Wal-Mart is latest big company with mobile-app security problems

The evidence keeps mounting that companies that put out mobile apps are not paying nearly enough attention to security. Even big companies with large and experienced IT staffs are guilty.

5 Ways to Prevent Data Loss in Mobile Environments

Confidential company data can make its way onto mobile devices, where it's no longer under the protection of your toughest network defenses. Does that make your data vulnerable? To find out, review some strategies for preventing data loss on mobile devices.

Secure smartphones are nice, but not enough

In the past week, two new ultra secure smartphones have been in the news. One is called the Blackphone. The other is called the Black phone. The difference in their names is a space. Here's what we know about the two most secure smartphones ever created.

Evan Schuman: Transparency about data retention requires knowing what you have

A new call for transparency about what data mobile apps are retaining sounds fine and noble, but too many companies don't even know what their apps know about consumers.

The Open Source Rookies of the Year Awards

, the open source software management company, picks the top 10 open source projects launched in the past year, based on stats collected from the

Security Manager's Journal: Siccing MDM on personal mobile devices

The use of personal devices on the network has gotten out of control. Mobile device management could help, and it will play well with newly deployed NAC.

Mobile management: InfoWorld's expert guide

iPhones, iPads, BlackBerrys, Androids -- learn how to secure whatever smartphones and tablets your employees have

Kenneth van Wyk: High hopes for iPhone's Touch ID

The iPhone 5S is the first smartphone with fingerprint authentication. It's not perfect, but it could herald a new emphasis on security for mobile devices.

5 Reasons You Can Finally Ditch BlackBerry

BlackBerry 10 smartphone sales have been disappointing, and last week the company announced that it's essentially up for sale. Bad news aside, five key industry trends suggest that BlackBerry's purported advantages no longer matter.

IntegriCell's Aaron Turner: Security managers still don't get mobile security

For the past several months, security veteran Aaron Turner has been making the rounds at industry events presenting some pretty disturbing information about the state of mobile security.

HP Elitebook Folio: Delivering the business goods

Business travelers willing to give Windows 8 a spin have a noteworthy option in the HP Folio Elitebook Folio 9470m. Attractively slim and lightweight, this 14-inch Ultrabook delivers an assortment of business-oriented features, including a fingerprint scanner, a smart-card slot, and a solid-state drive that boosts performance on any task involving retrieval of data from storage. The battery life, while not outstanding, should get you through a cross-country flight.

Mobile Attacks Top the List of 2013 Security Threats

For years, information security experts have predicted a spike in mobile malware. Will 2013 be the year of mobile attacks? And what other security threats are on the horizon?

When in China, don't leave your laptop alone

If you travel to China or Russia, assume government or industry spooks will steal your data and install spyware. Here's how to thwart them

Kenneth Van Wyk: 'Tis the season to shop with care

With online holiday shopping on the rise, and mobile-device shopping coming into its own, the need to be aware of the necessary security precautions has grown.

Passwords are the weak link in IT security

Three decades into the digital revolution, passwords are still complicated, ineffective and a drain on IT's resources. What gives?