• Trusted platform module aids Windows mobile device security

    Keeping data safe in mobile devices is the Holy Grail for preventing corporate data loss.

    Diana Hwang1,110 pointsBadges:
  • Firm eases pain of patch management for mobile workforce

    Patch management can be costly and timely, especially if you've got a number of remote workers. But one IT manager found a way to streamline the process with an online tool that he says gives a better view of the patch management operation.

    Shamus McGillicuddy4,980 pointsBadges:
  • Portable storage devices invite big problems

    As mobile devices become smaller, cheaper and more portable, the dangers of portable storage threats increase.

    SearchCIOMidmarket9,485 pointsBadges:
  • Traditional security threats coming soon to mobile device near you

    Browser exploits, botnets and more will soon be coming to mobile devices, according to a report from the Georgia Tech Information Security Center. Knowing the key threats can help ward off the greatest dangers.

    Michael Morisy8,323 pointsBadges:
  • I spy with my little eye …something confidential

    Could your company's trade secrets be child's play for industrial espionage? Remember the popular children's game I spy? The first child might call out, "I spy with my little eye -- something green," then other players would attempt to guess the secret object. The proliferation of cell phones with...

    BrentSheets6,925 pointsBadges:
  • Smartphone insecurity: There’s a smartphone app for that

    Available smartphone apps are so impressive that users are flocking to mobile marketplaces such as iTunes App Store, Android Marketplace and BlackBerry App World. To protect business-use smartphones, enterprises need to lock in IT policies and deploy robust centralized controls to circumvent...

    searchsecurity20,705 pointsBadges:
  • In-the-cloud defenses for mobile malware

    Mobile antivirus programs apply laptop best practices to PDAs and smartphones, but there are many other ways to protect corporate assets from mobile malware. Complementary "in the cloud" defenses include enterprise sync servers, network gateways and wireless services that incorporate mobile malware...

    searchsecurity20,705 pointsBadges:
  • Defining your mobile security policy

    Discover three key elements that are essential to your mobile security policy.

    Craig Mathias725 pointsBadges:
  • Symbian: Protect your data, not just your device

    As handheld devices become more common, protecting the data stored on them becomes a primary concern. Fortunately, mobile operating systems now include security features that enterprises can use to enforce corporate policies. In this series, we explore data protection on today's most popular...

    searchsecurity20,705 pointsBadges:
  • Nonpareils of mobile security info: Intel’s Wireless Security Resource Center

    A look at the copious resources available at Intel's Wireless Security Resource Center.

    Etittel4,750 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.