Mobiles

Is BYOD a four-letter word in your organisation?

Is BYOD a four-letter word in your organisation?

Decide on your mobiles policy, then choose the technology that allows that policy to be delivered says Sergio Galindo.

US marshals grab mobile phone data from the sky

US marshals grab mobile phone data from the sky

By

Airborne law enforcement surveillance devices grab phone data on tens of thousands at a time.

Controlling mobile data loss

Controlling mobile data loss

Security strategy to prevent mobile data loss involves careful considerations regarding the user, device, and network. Mike Raggo advises implemening a range of controls including use of an enterprise mobility management platform.

Reducing risk in a post-BlackBerry world

Reducing risk in a post-BlackBerry world

Raimund Genes asks, If even Obama's ditching the BlackBerry, what hope does the IT department have?

Web ads leading source of mobile malware

Web ads leading source of mobile malware

By

Research from Blue Coat Systems claims to show that Web-based adverts have taken over from adult Web sites as the leading source of mobile malware.

SC Webcasts UK

Sign up to our newsletters

FOLLOW US