More CommentaryOne Secret That Stops Hackers: Girlfriends
The majority of hackers "age out" of hacking as they get older and find girlfriends, families, and other responsibilities. Why not invest in... Most Smartphones Lost At Night
LookOut Mobile says two-thirds of lost devices vanish from pubs and bars at night. New iPad Gets Mythbusters Treatment
Apple forgot to make the new iPad impervious to lasers, assault rifles, and hard drops, according to entertaining new videos. Want Your Personal Device Controlled By IT?
Your lips say "no" but your behavior says "yes". In the end, most employees will give up some privacy in return for convenience if their employers... Microsoft Visual Studio 11 Makes Metro Real
VS 11 is a live beta, meaning it just got a little less risky to build production Metro apps. 10 Lessons From RSA Security Conference
Mobile, social, and cloud computing have changed the security equation. Carrier IQ Fights Back With Consumer Dashboard
Carrier IQ, attacked last year for monitoring cell phone user data, says it can help consumers gauge wireless phone performance--if carriers... Why BYOD Doesn't Always Work In Healthcare
Security and screen layout problems make it difficult to let clinicians bring their own tablets and smartphones to work. What One-Time Passwords Could Do For Mobile
Smartphones will soon be wallets. They're already corporate data repositories. And finally, Yubico lets us stop using static passwords to lock it... Wireless Spectrum Doomsday Looms
For now, tiered plans are keeping carrier networks from melting down. But demand for mobile broadband means the current system is unsustainable. Will Biometrics Go Mainstream In 2012?
IBM thinks so, and the US-VISIT program may give a glimpse into the future. But what about data theft? Microsoft's Droidrage WP7 Giveaway Heats Up
Malware-infected Android owners offered chance to win a free Windows Phone 7; more than 3,200 entered. Carrier IQ: What Carriers, Device Makers Must Do Next
Let smartphone users opt into how their devices and related data get tracked, preferably from handsets. Otherwise, carriers and manufacturers will... Carrier IQ: Just A Little Evil?
Carrier IQ software may collect far less data than first reported, but Pandora's out of the box, and it's time for carriers to disclose all... 4 Steps To Assess Mobile Security Risk
Analyzing how mobility could lead to data loss feels like taking a shot in the dark. At a moving target, with a blindfold on. But there are ways... Carrier IQ Gets Scrooged For The Holidays
A tale of data collection, cease and desist, wiretap allegations, privacy questions, and potential redemption. Carrier IQ: Senate Demands Answers
U.S. Senate weighs in on the Carrier IQ phone-snooping issue. Carrier IQ: Mobile App Crap Must Stop
The Carrier IQ situation is an insane breach of trust for enterprises. And unless phone makers copy the Apple model, where carriers can't... Android Security: Threat Level None?
Security firms are fanning the flames of fear about mobile malware and viruses, while others accuse such firms of being scammers. Who's right, and... Top 5 MDM Must-Do Items
Whether mobility is a problem or an opportunity depends not on software but on your policies. BYOD Strategy Should Start With Data-Centric Security
Is "your device is now our device" the approach that your IT team takes? It's time to get back to data security first principles. MDM: To Sandbox Or Not To Sandbox?
Mobile device management systems take different approaches to sandboxing. Is mobile virtualization the answer? Regulating The Dark(er) Side Of Consumerization
Think an influx of shiny tablets is the main worry? Sorry to break it to you, but hardware is the least of our problems. MDM Market Poised For Fundamental Change
Are you ready for mobile device management as just another monthly service--and fee--from your carrier? Steve Jobs And Tech Security
Apple's products continue to highlight what relatively secure operating system environments look like.
Mobility's Next Challenge: 8 Steps to a Secure Environment
Taking your company's mobile capabilities to the next level--whether on personally or company-owned devices-requires a lifecycle management plan that encompasses application security, development, distribution, support and enhancement. We show you how to get there and provide insight into five mobile application development options.
Buyer's Guide: Mobile Device Management
Want the lowdown on nine top MDM products? Our InformationWeek Buyer's Guide is your one-stop guide for choosing an MDM system that match your requirements. ZIP file includes: Detailed comparison charts on security, administration, and platform and reporting features; our full questionnaire; and responses from Absolute Software, AirWatch, Fiberlink Communications, JAMF Software, MobileIron, Odyssey Software, Symantec, Tangoe, and Zenprise.
Dark Side of Mobile Apps
Companies are rushing headlong to develop applications for Android, Apple and BlackBerry devices. But IT must maintain its secure development lifecycle process or risk a black eye.
Reducing Mobile Device Risks to Enterprise Data
Innovative IT shops are turning the mobile device management challenge into a business opportunity--and showing that we can help people be more connected and collaborative, regardless of location. We offer a framework of four possible strategies to secure the mobile environment.