• Fingerprint recognition and mobile security

    Fingerprint recognition technology for mobile devices is posed to become the preferred user authentication solution mobile device security. In this Technical Note from the Farpoint Group, you'll see why Fingerprint recognition is likely to become the methodology of choice for all aspects of mobile...

    ITKE363,905 pointsBadges:
  • Traditional security threats coming soon to mobile device near you

    Browser exploits, botnets and more will soon be coming to mobile devices, according to a report from the Georgia Tech Information Security Center. Knowing the key threats can help ward off the greatest dangers.

    ITKE363,905 pointsBadges:
  • Enterprise mobile security best practices force IT to adapt

    Today's enterprise mobile security best practices are different than what IT is used to. Locking everything down won't work -- and it probably isn't necessary.

    ITKE363,905 pointsBadges:
  • I spy with my little eye …something confidential

    Could your company's trade secrets be child's play for industrial espionage? Remember the popular children's game I spy? The first child might call out, "I spy with my little eye -- something green," then other players would attempt to guess the secret object. The proliferation of cell phones with...

    BrentSheets6,925 pointsBadges:
  • Portable storage devices invite big problems

    As mobile devices become smaller, cheaper and more portable, the dangers of portable storage threats increase.

    SearchCIO5,010 pointsBadges:
  • Smartphone insecurity: There’s a smartphone app for that

    Available smartphone apps are so impressive that users are flocking to mobile marketplaces such as iTunes App Store, Android Marketplace and BlackBerry App World. To protect business-use smartphones, enterprises need to lock in IT policies and deploy robust centralized controls to circumvent...

    LisaPhifer1,345 pointsBadges:
  • Two-factor authentication: Mobile security at your fingertips

    Two-factor authentication -- the security process that requires two means of identification, one of which is usually a physical token such as a fingerprint, the other typically being a password -- is more complex than using just one authentication method, but it's a lot more secure. In this tip,...

    Craig Mathias915 pointsBadges:
  • In-the-cloud defenses for mobile malware

    Mobile antivirus programs apply laptop best practices to PDAs and smartphones, but there are many other ways to protect corporate assets from mobile malware. Complementary "in the cloud" defenses include enterprise sync servers, network gateways and wireless services that incorporate mobile malware...

    LisaPhifer1,345 pointsBadges:
  • Mobile security threats

    Mobile security threats come in many forms, and they continue to evolve. IT needs to be prepared to handle mobile device security and protect smartphones from malware, eavesdropping, unauthorized access, theft and more. This tip outlines the mobile security threats facing the mobile enterprise and...

    Craig Mathias915 pointsBadges:
  • Mobile devices: Corporate security strategies

    According to analysts, companies grappling with mobile/wireless security are expected to take a hit from improper use and mobile malware attacks resulting in real business interruption. Fortunately, most of these exploits will take advantage of vulnerabilities that are identifiable and resolvable....

    LisaPhifer1,345 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.