Arxan Technologies reports that hacked versions of mobile apps were found across the majority of industries including business, productivity, financial services, communication and healthcare.
What if a personal device being used for work is lost or stolen? What happens to the data? Who pays for it? The enterprise and employees alike must consider liability, policies and procedures before allowing BYOD.
Motorola's investment bolsters the company's mobile security options while allowing Fixmo, a mobile security solutions provider, to broaden its horizons.
Lenovo's two new lightweight ultrabooks support mobility in the enterprise with long battery life and several features for business users.
With the amount of mobile malware increasing among Android devices, Sophos releases new anti-virus app. Enterprise version is next.
While sales professionals have been slow to embrace mobile technology, tablets are gaining traction among the sales force, and IT is starting to catch on as well.
Cadec partners with Verizon Wireless for M2M Management for operational effciencies.
With the rapid move toward BYOD, IT must also move quickly to define policy and manage mobile related expenses. Here are a few best practices for developing a strategy.
The "scrambls" social media plug-in keeps important information shared over Twitter private.
The file editing and sharing application allows for more secure file sharing, editing and saving, and has also been integrated with Good Technology's 'Good Dynamics' secure platform to allow equally-secure communication.