Locating the places where security holes may lurk is the first step in a good defense.
Mobile security breaches can be devastating - as those included here show. Learn what your business can do to protect itself.
Properly deploying and managing your new collection of mobile applications - and your app store - is far more important than device management. Here's how to do it.
Banks, telcos and government agencies are just three examples of the organizations that are leveraging voice to streamline and enhance authentication, including on mobile devices.
A new generation of M2M technology is creating revolutionary changes in how people communicate with machines and how machines communicate with each other. Here's what you need to know.
A primer on mobile two-factor authentication - you really can use BYOD as a security asset.
The best job of mobile device cost management today is to take a simple – but consistent and aggressive – approach: combining a few targeted tactics to deliver the highest ROI with the least amount of effort.
Cloud-based computing, especially mobile cloud computing, is rapidly emerging as a solution of choice for enterprises deploying new technology capabilities. What's the best way to do it?
Protecting data is a critical mobile concern. Yet too many large and small businesses fail to do so - a risk no company can truly allow. Here is a start at a game plan.
Ubiquitous access and a fast means to get to applications - it's what both users and IT want. Here's how to get 'simply connected'