Security: Mobile & Wireless


SCADA Protocol Testing in Critical Infrastructure

We can no longer rely on "security through obscurity" as more devices are Ethernet and wireless enabled.

Q&A: Keeping Mobile Applications Secure

How can you make sure your mobile applications are secure? A security expert offers several suggestions.

Top 5 Enterprise Security Trends

From BYOD to social media, the trends that are keeping security administrators on their toes.

Cloud Security Services Help SMB Buyers Brook Budget Woes

SMB customers have a growing appetite for cloud-based security services. It isn't likely to be sated anytime soon. Thanks to a perfect storm of economic and technology trends, SMB consumption of cloud security services is expected to increase sharply over the next five years.

Q&A: Addressing BYOD with Identity-Based Security

Bring-your-own-device approaches can be a nightmare for security administrators. Identity-based security can help eliminate risks posed by mobile hardware.

Q&A: Managing Endpoints and Mobile Devices

Mobile devices are just one of a number of assets that must be managed. Fortunately, the cloud can help.

Supporting BYOD with Strong Mobile Device Management Policies

How to make mobile device management a core part of your security management strategy.

New Windows Worm Exploits IT Sloppiness

Silly or not, the Morto worm has caused a good bit of mischief.

IT Still Facing Mobile Challenges

Neither iOS nor Android has been designed with enterprise security in mind. That makes securing them a challenging proposition.

Q&A: Best Practices for Avoiding Mobile Malware

Mobile devices are bombarded by direct attacks and those designed for any Web-connected device. We explain best practices for end users and best practices for IT that can protect against these attacks.

A New Approach to Mobile Encryption

Piecemeal efforts only resolve some threats while burdening IT resources. Enterprises need to take an entirely new perspective for managing mobile security.

Q&A: Preventing Mobile Vulnerabilities

Best practices for keeping mobile devices safe.

How to Mitigate Smartphone Threats to Your Corporate Network

These tips can help you minimize mobile threats.

Slowly but Surely, IT Addresses Mobile Security Threats

Nine out of ten enterprises say they plan to invest in new endpoint security technologies to help them better manage mobile devices

How Mobile Computing, Not Windows Desktop, Will Transform Cybercrime

As mobile devices become more ubiquitous, they and not the Windows desktop will become Ground Zero for attacks and exploits.

DDoS Unbound

DDoS attacks are bigger and more frequent than ever, and a lack of insight into IPv6 security is particularly worrisome.

Q&A: Securing Your Mobile Environment

How to improve security for mobile users in light of new, complex technologies such as cloud computing.

A Tough Year that Could Have Been Worse

Security admins faced a host of vulnerabilities and new attacks in 2010, but the nightmare scenarios that could've kept security pros up at night blessedly didn't come to pass.

The Less Productive Mobile Workforce

Mobile users are more likely to get themselves into trouble -- but not the kind you'd expect.

Q&A: The State of IT Security

Recommendations for making data safer that won’t decimate your IT budget.