All News
Calif. Sues Delta For App Privacy ViolationsCalifornia attorney general opens suit after Delta ignores warnings about its nonexistent app privacy policy. This may be a small part of the... Blame Screen Size: Mobile Browsers Flunk Security Tests
More than 90% of mobile device browsers now in use failed safety checks, find Georgia Tech researchers. Guatemala Arrests Rogue AV Founder McAfee
In a stream of blog posts from prison, McAfee details his arrest for immigration violations after fleeing Belize, where he's wanted for... RIM's BlackBerry 10 To Block Certain Passwords
A file uncovered in early builds of BlackBerry 10 shows a list of 106 passwords that won't be allowed on RIM's new devices. McAfee, AV King Turned Fugitive, Surfaces In Guatemala
Geotagged photo reveals location of murder suspect John McAfee, on the run from authorities in Belize. Centrify Harnesses Active Directory For Mobile Device Management
DirectControl for SaaS promises convenient single sign-on to cloud apps and services for mobile users and secure, simple deployment for IT. iPhone, iPad Email Attack Could Compromise Routers
Legitimate-looking email messages opened on iPhone, iPad or OS X systems can be used by hackers to gain control of routers, reports security... IonGrid's iPhone Security Tools Stress Flexibility
Strong Microsoft Office document rendering features may help ionGrid stand out in the crowded enterprise mobile application management market. iPad Heist At JFK Highlights Mobile Tech Risks
Two thieves made off with 3,600 iPad Minis in a brazen robbery at New York's JFK Airport, demonstrating that crooks can strike in unexpected ways.... Inside Zenprise's Newest BYOD Tools
MobileManager 8, and Zensuite attempt to boost usability along with security. IBM Expands Mobile Security, Management Suite
With new BYOD and app development tools, IBM wants customers to look at mobile as an opportunity, not a risk. RIM BlackBerry 10 Gets Government Security Clearance
You won't be able to buy any BlackBerry 10 smartphones from RIM until March 2013, but when you do, they'll be certified for government work. Sophos AV Teardown Reveals Critical Vulnerabilities
Antivirus vendor says it's patched all software flaws disclosed by researcher, some of which could be used to remotely control Windows, Mac, or... MobileIron Brings VPN-Like Tunnels To Mobile Security
AppConnect and AppTunnel aim to help IT secure business apps while keeping them separate from personal content in a BYOD environment. Smartphone Anti-Theft Database: What's Enterprise Impact?
Major U.S. phone carriers hope their new database will deter thieves. But experts say the plan won't soothe many enterprise data security concerns. BYOD Security Tops Doctors' Mobile Device Worries
Bring-your-own-device trend leads healthcare providers to question mobile device management and security effectiveness, KLAS study finds. IBM Security Tools Add Hadoop Monitoring
A Hadoop intelligence tool stands out as IBM updates its security portfolio to address security issues related to big data, analytics, cloud... 6 Reasons iOS 6 Jailbreaks Will Be Tough
Glory hounds hoping to jailbreak Apple's newest devices won't have an easy time of it. Security experts detail the challenges. iOS6 Ad Tracking: How To Opt Out
By default, iOS 6 tracks iPhone and iPad owners' browsing history to serve advertisements. RIM CIO Talks Enterprise BYOD
CIO Robin Bienfait talks about RIM's enterprise-friendly features like BlackBerry Balance, security and apps, and welcoming iOS and Android... Appthority Cuts Through Enterprise Mobility Chaos
Startup pitches its tech for simplifying mobile app and device management. Check out our video coverage from InformationWeek 500 and Valley View. Symantec's New Answer To Enterprise Mobile Headaches
Mobile Management Suite offers IT an umbrella approach to mobile device, app, and security management, simplifies pricing. Does Mobile Antivirus Software Really Protect Smartphones?
Bad news: Many mobile antivirus apps are useless. Here's what mobile device management and mobile application management experts say you should... 'MegaDroid' Tests Android Security At City Scale
Department of Energy launches MegaDroid, a network of 300,000 virtual Android devices, to study mobile security and stability at a city-sized scale. Six Tips For Navigating The MDM Jungle
As mobile device management and mobile application management choices become overwhelming, consider these key issues.
InformationWeek Reports
Mobility's Next Challenge: 8 Steps to a Secure Environment
Taking your company's mobile capabilities to the next level--whether on personally or company-owned devices-requires a lifecycle management plan that encompasses application security, development, distribution, support and enhancement. We show you how to get there and provide insight into five mobile application development options.
Buyer's Guide: Mobile Device Management
Want the lowdown on nine top MDM products? Our InformationWeek Buyer's Guide is your one-stop guide for choosing an MDM system that match your requirements. ZIP file includes: Detailed comparison charts on security, administration, and platform and reporting features; our full questionnaire; and responses from Absolute Software, AirWatch, Fiberlink Communications, JAMF Software, MobileIron, Odyssey Software, Symantec, Tangoe, and Zenprise.
Dark Side of Mobile Apps
Companies are rushing headlong to develop applications for Android, Apple and BlackBerry devices. But IT must maintain its secure development lifecycle process or risk a black eye.
Reducing Mobile Device Risks to Enterprise Data
Innovative IT shops are turning the mobile device management challenge into a business opportunity--and showing that we can help people be more connected and collaborative, regardless of location. We offer a framework of four possible strategies to secure the mobile environment.