Mobile Security

Mobile security news, trends, analysis and practical advice

Android Trends

Android Resolutions

8 New Year's resolutions for Android fans in 2018

A set of realistic goals to sharpen your smartphone experience — and save you money! — in the months ahead.

Android 2018 Primer

Android 2018 primer: 10 bits of telling analysis to mull over

'Tis the season for looking back — and looking ahead.

Mobile security

The best mobile threat defense is mobile threat detection

It’s time to add MTD to your Enterprise Mobile Management toolkit. Because it’s better to get ahead of mobile threats than it is to try and clean them up after you’ve been attacked.

Android Security

Android security audit: An 11-step checklist

Android security doesn't have to be a source of stress. These easy-to-follow steps are all you need to keep the boogeyman at bay.

Google Play Protect

When Google Play Protect fails

Google's system for keeping malware off Android phones is mostly effective — so how does it sometime stumble so spectacularly?

Mobile security

Machine learning-based threat detection is coming to your smartphone

MobileIron has partnered with a machine learning-based threat detection vendor to port its technology onto its EMM client, a growing trend in the mobile space.

mobile enterprise apps

CISO: Think about how your customers actually use your mobile apps

Veteran chief information security officer Barak Engel blasts the mobile community for torpedoing enterprise security in his new book, "Why CISOs Fail Security."

Android 8 Oreo Security

Android 8.0 in-depth: Oreo's not-so-obvious security enhancements

Some deep-dive details on significant security upgrades headed to your device with Google's Android 8.0 Oreo release.

four professionals looking at mobile devices

How to choose the right enterprise mobility management (EMM) tool

As mobile device management continues to morph, consider what EMM features you need right now as well as what you might need in the future -- and don't neglect the user experience.

Computerworld - Mingis on Tech - video podcast teaser [3x2/1800x1200]

Mingis on Tech: Android vs iOS – for mobile security, which one's better?

Apple's iOS has long been seen as a more secure mobile operating system than Android. Here's how to evaluate each side's claims about mobile security.

android vs ios security boxing battle boxing gloves

Android vs iOS security: Which is better?

While all mobile devices have inherent security risks, Android has more vulnerabilities because of its inherent open-source nature, the slow pace with which users update the OS and a lack of proper app vetting.

emm predictions 2017 mdm

MDM comparison: VMware AirWatch vs. IBM Maas360

Real-world users of mobile device management systems weigh in on two big players in the market: VMware AirWatch and IBM MaaS360.

google glass enterprise edition

Is Google Glass really ready for the enterprise?

Google Glass Enterprise Edition is now available to more businesses through its network of development partners, but does it really work as a collaboration and productivity tool?

mobile device management

Choosing EMM software as an add-on may soon be unnecessary

Enterprise mobility management is quickly becoming just another set of tools in a larger software bundle offered by big-name vendors -- leaving IT managers to decide whether to even consider independent software providers.

mobile security data protection [Thinkstock]

What is app wrapping? One way to more secure mobile apps

As part of a mobile application management strategy, app wrapping allows developers and administrators to apply security enforcement policies to a mobile app without changing its look or functionality.

mobile payments / tablet

How to expose flaws in custom-built mobile apps

As companies move toward a mobile-first strategy, more and more are developing apps in-house -- and unwittingly exposing themselves to cybersecurity flaws. Here's how to avoid that problem.

facial recognition biometrics

Facial recognition in the new iPhone would make huge waves

Amid reports that Apple is preparing to abandon fingerprint biometric authentication in favor of 3D facial recognition coupled with iris scans, the mobile industry is preparing for authentication upheaval.

mobile device management

What's the difference between MDM, MAM, EMM and UEM?

While BYOD made it easier for employees to get their jobs done anywhere, anytime, keeping company data safe requires serious management. Here's how to pick between Mobile Application Management and Mobile Device Management.

Load More