Mobile Device Security

Last Updated on 29 April 2015, Total: 13 Articles and Tutorials

  1. Assessing the Security of Mobile applications (Part 2) - Testing the application

    In this article we will cover testing of applications... Read More

  2. Assessing the Security of Mobile Applications (Part 1) - Planning

    In this article series we will consider and cover ways in which the organisation can assess mobile applications to improve security when mobile devices are used for corporate function... Read More

  3. Planning Considerations for BYOD and Consumerization of IT (Part 6)

    In this, Part 6, we’re going to talk about how you can use robust auditing and reporting capabilities for your BYOD environment to make your network more secure and to demonstrate compliance... Read More

  4. Planning Considerations for BYOD and Consumerization of IT (Part 5)

    In this, Part 5, we’ll move on to the discussion of BYOD compliance with government and industry security and privacy standards... Read More

  5. Planning Considerations for BYOD and Consumerization of IT (Part 4)

    In this Part 4, we’ll take up the discussion where we left off in the last article and offer some thoughts about the need for your BYOD strategy to support modern authentication mechanisms... Read More

  6. Planning Considerations for BYOD and Consumerization of IT (Part 3)

    In this article we’ll finish our coverage of the BYOD solution requirements and the meaning and intent behind them... Read More

  7. Planning Considerations for BYOD and Consumerization of IT (Part 2)

    In this article, we’ll being our planning process by discussing a collection of solution requirements that cuts across all secure BYOD deployments... Read More

  8. Planning Considerations for BYOD and Consumerization of IT (Part 1)

    In the first part of this series on planning considerations for security BYOD and consumerization of IT, we'll look at the BYOD problem domain and discuss key aspects of planning and design... Read More

  9. Has the end of Antivirus arrived?

    With the advance of computing into the world of mobility, has the requirement for antivirus deprecated or is this a case of complacency. Some vendors are claiming that they can get rid of pattern files and others are saying no antivirus altogether. In this article we explore the options and the reality... Read More

  10. The Android Invasion: BYOD Security Implications and Solutions

    This article will go beyond previous discussions on this site about mobile security threats and examine how you may be able to tame the emerging monster that BYOD is becoming... Read More

  11. Why Bring Your Own Device (BYOD) needs your attention

    We are in the middle of the biggest computer revolution since the PC; the explosive number of devices is descending on corporates. In some cases the personal devices can outnumber the corporate devices. This article will cover strategies that should be considered when securing your company... Read More

  12. Windows 8 Tablets: Secure enough for the Enterprise?

    In this article, we'll look at both the obstacles and the reasons Windows 8 tablets just might be able to overcome barriers and take the enterprise by storm... Read More

  13. With the convergence of mobile devices, mobile security is a clear focus

    This article will look at emerging technologies in mobile security, the security risks surrounding mobile platforms and steps to secure your mobile devices and their contents... Read More

Featured Links