February 17, 2016 IBM and F5 Announce Partnership to Advance the Mobile Enterprise 2 min read - Businesses searching for a way to securely allow access to mobile enterprise apps can now turn to a new solution that combines EMM and APM technologies.
February 16, 2016 Lockdroid Ransomware Fails Thanks to Google’s Verify Apps 2 min read - At a recent security conference, Google claimed its Verify Apps feature prevented Android users from becoming infected with the Lockdroid ransomware.
Endpoint February 15, 2016 Mobile Malware on Smartphones and Tablets: The Inconvenient Truth 3 min read - Mobile malware poses a major threat to enterprises, their customers and employees, and each of us as individuals — but there are ways to fight back.
Endpoint February 11, 2016 The Boy Who Cried Mobile Malware 4 min read - 2016 has a chance at being the year of mobile malware — or history could just be repeating itself. Here's what you need to know to remain secure.
Endpoint February 1, 2016 What a CISO Breakfast Confirmed About Mobile Security Threats and Strategies 4 min read - At a recent business breakfast, CISOs from a variety of enterprises raised many mobile security concerns that should be top-of-mind for all leaders.
Endpoint January 29, 2016 Mobile Identity: Convenience and Privacy 3 min read - Mobile identity solutions offer users the ability to manage digital identity documents while maintaining security and privacy.
January 26, 2016 Public Wi-Fi in NYC Goes Live 2 min read - New York City has begun the rollout of its public Wi-Fi kiosks, but corporate users should be aware of potential security risks before connecting.
Endpoint January 26, 2016 Mobility Now: Mobile Disruption in Retail 3 min read - Retail organizations must integrate mobility into their overall business strategies if they hope to provide customers with the best possible experience.
January 14, 2016 Double Dose of Android Trojan Malware Hits Online Banking Users 2 min read - The cybercriminals behind Android Trojan malware are targeting online banking users with compromised applications and authentication schemes.
Endpoint January 11, 2016 Mobile How-To: Securing and Encrypting Enterprise Mobile Messaging 3 min read - Enterprise mobile messaging is a must-have in today's fast-paced world, but the communications need to balance security with ease of use.