Mobile Security
Mobile Security | News, how-tos, features, reviews, and videos
12 Android settings that'll strengthen your security
Some of the most important Android settings are also the most buried — and they're absolutely worth your while to uncover and put into action.
Android security checkup: 16 steps to a safer phone
Android security doesn't have to be a source of stress. These level-headed steps are all you need to keep the boogeyman at bay.
Cybersecurity in 2021: Stopping the madness
The challenges are greater than ever. But security pros have learned a lot – and with luck, the right strategic defenses can help even the highest-value targets withstand severe attacks.
Android security: Analysis, advice, and next-level knowledge
Expand your Android security knowledge with this comprehensive collection of level-headed resources.
How to fix Android's Smart Lock Trusted Places feature
A 60-second workaround to make Android's location-based Smart Lock start working again.
BlackBerry says its new Digital Workplace eliminates need for VPN, VDI
BlackBerry has integrated its Desktop and Access Browser with partner Awingu's secure browser-based workspace and AI-driven security software from its acquisition of Cylance.
UEM to marry security — finally — after long courtship
Machine learning will be key in evaluating whether a mobile device and its user should be allowed to connect to a corporate application or data silo, as user behavior becomes a part of overall endpoint security.
7 mobile security threats that may catch you by surprise
Even if you're usually savvy about cybersecurity, anyone can have a vulnerable moment (in our writer's case, it was his mother's funeral).
BlackBerry refreshes its UEM suite, focuses on zero-trust access
BlackBerry's latest version of its flagship Enterprise Mobility Suite is aimed at enabling management of all devices and apps across all vendor platforms.
What you need to know about new data-security rules for business travel
From U.S. Customs agents to cybercriminals, everyone wants to copy the data on your phone and laptop. Here’s how to protect your rights and also avoid industrial espionage.
Microsoft combines Intune with ConfigMgr
Enterprises that have System Center Configuration Manager licenses now have automatic access to Intune via the new, combined Endpoint Manager.
Microsoft Intune can now block unauthorized BYOD hardware
Microsoft's decision to integrate third-party mobile threat defense software is a sign of bigger things to come for the company's UEM platform.
Will 5G increase mobile security?
We love our smartphones, but there's a dark side. Their prevalence and users’ tendencies to connect over public Wi-Fi make mobile devices a common target of bad guys. Analyst Jack Gold looks at how to mitigate the risk.
Will Chromebooks rule the enterprise? (5 reasons it may)
Google schooled Apple and Microsoft in the education market by growing market share from zero to 60 in eight years. Insider Pro columnist Mike Elgan examines whether Google can do it again in the enterprise.
Can you be mobile AND secure?
Despite the security challenges mobile devices create, there is no going back. Users demand corporate access from their smartphones and companies benefit from this access with increased efficiency, better use of time and improved user...
Your guide to using iCloud in business
A growing number of companies are using iCloud -- Apple’s storage and syncing suite for Mac and iOS. Here's how to take advantage of iCloud’s ease of use and tight security.
external url
Your guide to using iCloud in business
A growing number of companies are using iCloud -- Apple’s storage and syncing suite for Mac and iOS. Here's how to take advantage of iCloud’s ease of use and tight security.
The best Android password managers
Not all Android password managers are created equal — so which one makes the most sense for you?