InformationWeek: The Business Value of Technology

InformationWeek: The Business Value of Technology
InformationWeek Big Data Coverage
= Member Content
Mobile Security | Blog | Archives

More Commentary

New iPad Gets Mythbusters Treatment   March 21, 2012
Apple forgot to make the new iPad impervious to lasers, assault rifles, and hard drops, according to entertaining new videos.

| Read Article »

Want Your Personal Device Controlled By IT?   March 09, 2012
Your lips say "no" but your behavior says "yes". In the end, most employees will give up some privacy in return for convenience if their employers...

| Read Article »

Microsoft Visual Studio 11 Makes Metro Real   March 05, 2012
VS 11 is a live beta, meaning it just got a little less risky to build production Metro apps.

| Read Article »

10 Lessons From RSA Security Conference   March 01, 2012
Mobile, social, and cloud computing have changed the security equation.

| Read Article »

Carrier IQ Fights Back With Consumer Dashboard   March 01, 2012
Carrier IQ, attacked last year for monitoring cell phone user data, says it can help consumers gauge wireless phone performance--if carriers...

| Read Article »

Why BYOD Doesn't Always Work In Healthcare   February 28, 2012
Security and screen layout problems make it difficult to let clinicians bring their own tablets and smartphones to work.

| Read Article »

What One-Time Passwords Could Do For Mobile   February 21, 2012
Smartphones will soon be wallets. They're already corporate data repositories. And finally, Yubico lets us stop using static passwords to lock it...

| Read Article »

Wireless Spectrum Doomsday Looms   January 17, 2012
For now, tiered plans are keeping carrier networks from melting down. But demand for mobile broadband means the current system is unsustainable.

| Read Article »

Will Biometrics Go Mainstream In 2012?   December 21, 2011
IBM thinks so, and the US-VISIT program may give a glimpse into the future. But what about data theft?

| Read Article »

Microsoft's Droidrage WP7 Giveaway Heats Up   December 15, 2011
Malware-infected Android owners offered chance to win a free Windows Phone 7; more than 3,200 entered.

| Read Article »

Carrier IQ: What Carriers, Device Makers Must Do Next   December 09, 2011
Let smartphone users opt into how their devices and related data get tracked, preferably from handsets. Otherwise, carriers and manufacturers will...

| Read Article »

Carrier IQ: Just A Little Evil?   December 06, 2011
Carrier IQ software may collect far less data than first reported, but Pandora's out of the box, and it's time for carriers to disclose all...

| Read Article »

4 Steps To Assess Mobile Security Risk   December 05, 2011
Analyzing how mobility could lead to data loss feels like taking a shot in the dark. At a moving target, with a blindfold on. But there are ways...

| Read Article »

Carrier IQ Gets Scrooged For The Holidays   December 03, 2011
A tale of data collection, cease and desist, wiretap allegations, privacy questions, and potential redemption.

| Read Article »

Carrier IQ: Senate Demands Answers   December 02, 2011
U.S. Senate weighs in on the Carrier IQ phone-snooping issue.

| Read Article »

Carrier IQ: Mobile App Crap Must Stop   December 01, 2011
The Carrier IQ situation is an insane breach of trust for enterprises. And unless phone makers copy the Apple model, where carriers can't...

| Read Article »

Android Security: Threat Level None?   November 19, 2011
Security firms are fanning the flames of fear about mobile malware and viruses, while others accuse such firms of being scammers. Who's right, and...

| Read Article »

Top 5 MDM Must-Do Items   November 15, 2011
Whether mobility is a problem or an opportunity depends not on software but on your policies.

| Read Article »

BYOD Strategy Should Start With Data-Centric Security   November 04, 2011
Is "your device is now our device" the approach that your IT team takes? It's time to get back to data security first principles.

| Read Article »

MDM: To Sandbox Or Not To Sandbox?   November 01, 2011
Mobile device management systems take different approaches to sandboxing. Is mobile virtualization the answer?

| Read Article »

Regulating The Dark(er) Side Of Consumerization   October 10, 2011
Think an influx of shiny tablets is the main worry? Sorry to break it to you, but hardware is the least of our problems.

| Read Article »

MDM Market Poised For Fundamental Change   October 10, 2011
Are you ready for mobile device management as just another monthly service--and fee--from your carrier?

| Read Article »

Steve Jobs And Tech Security   October 06, 2011
Apple's products continue to highlight what relatively secure operating system environments look like.

| Read Article »

One Mobile Device Security Threat You Haven't Considered   October 05, 2011
Remember that Dilbert cartoon where the waitress comes back wearing a fur coat? Wireless store employees may be the next ones wearing mink, thanks...

| Read Article »

Amazon Kindle Fire: Lingering Questions   September 29, 2011
Amazon's Kindle Fire cleanly carves out a spot for itself in a crowded tablet market—and leaves enterprise IT with some security to-do items.

| Read Article »

InformationWeek Reports

report Mobility's Next Challenge: 8 Steps to a Secure Environment
Taking your company's mobile capabilities to the next level--whether on personally or company-owned devices-requires a lifecycle management plan that encompasses application security, development, distribution, support and enhancement. We show you how to get there and provide insight into five mobile application development options.

report Buyer's Guide: Mobile Device Management
Want the lowdown on nine top MDM products? Our InformationWeek Buyer's Guide is your one-stop guide for choosing an MDM system that match your requirements. ZIP file includes: Detailed comparison charts on security, administration, and platform and reporting features; our full questionnaire; and responses from Absolute Software, AirWatch, Fiberlink Communications, JAMF Software, MobileIron, Odyssey Software, Symantec, Tangoe, and Zenprise.

report Dark Side of Mobile Apps
Companies are rushing headlong to develop applications for Android, Apple and BlackBerry devices. But IT must maintain its secure development lifecycle process or risk a black eye.

report Reducing Mobile Device Risks to Enterprise Data
Innovative IT shops are turning the mobile device management challenge into a business opportunity--and showing that we can help people be more connected and collaborative, regardless of location. We offer a framework of four possible strategies to secure the mobile environment.