Mobile Device Security

Last Updated on 27 May 2015, Total: 14 Articles and Tutorials

  1. Assessing the Security of Mobile Applications (Part 3) - The Test Methods and Outcomes

    This article looks into the various mobile application test methods that can be used for app testing... Read More

  2. Assessing the Security of Mobile applications (Part 2) - Testing the application

    In this article we will cover testing of applications... Read More

  3. Assessing the Security of Mobile Applications (Part 1) - Planning

    In this article series we will consider and cover ways in which the organisation can assess mobile applications to improve security when mobile devices are used for corporate function... Read More

  4. Planning Considerations for BYOD and Consumerization of IT (Part 6)

    In this, Part 6, we’re going to talk about how you can use robust auditing and reporting capabilities for your BYOD environment to make your network more secure and to demonstrate compliance... Read More

  5. Planning Considerations for BYOD and Consumerization of IT (Part 5)

    In this, Part 5, we’ll move on to the discussion of BYOD compliance with government and industry security and privacy standards... Read More

  6. Planning Considerations for BYOD and Consumerization of IT (Part 4)

    In this Part 4, we’ll take up the discussion where we left off in the last article and offer some thoughts about the need for your BYOD strategy to support modern authentication mechanisms... Read More

  7. Planning Considerations for BYOD and Consumerization of IT (Part 3)

    In this article we’ll finish our coverage of the BYOD solution requirements and the meaning and intent behind them... Read More

  8. Planning Considerations for BYOD and Consumerization of IT (Part 2)

    In this article, we’ll being our planning process by discussing a collection of solution requirements that cuts across all secure BYOD deployments... Read More

  9. Planning Considerations for BYOD and Consumerization of IT (Part 1)

    In the first part of this series on planning considerations for security BYOD and consumerization of IT, we'll look at the BYOD problem domain and discuss key aspects of planning and design... Read More

  10. Has the end of Antivirus arrived?

    With the advance of computing into the world of mobility, has the requirement for antivirus deprecated or is this a case of complacency. Some vendors are claiming that they can get rid of pattern files and others are saying no antivirus altogether. In this article we explore the options and the reality... Read More

Featured Links