News

If someone told you that each mobile computing mishap in your company would cost you almost a half million dollars, would you find that number compelling? Me too.
Learn how you can protect your mobile computing solution from eavesdroppers and hackers. Integrated Solutions, October 2002 Written by: Jay McCall Have you ever picked up someone else's phone ...
Mobile computing presents an opportunity to get things right if CISOs approach it with the right strategy When I started my career at EMC in 1987, the company ran the business on Prime Computers.
In 2012, ESG research asked 315 security professionals working at enterprise organizations (i.e. more than 1,000 employees) about the impact of mobile computing on security management and ...
Mobile security is a growing area of concern in the enterprise. How secure are mobile devices within your organization?
Edge computing is now a reality that’s reshaping industries and transforming approaches to mobile network infrastructure, but failure to secure it can expose networks and data to cyber threats ...
All security vendors have recognized and responded in some way to the mobile computing security threat, but offerings are not currently prevalent in the market,'' Krans said. ''With more sensitive and ...
Contributors Cybersecurity in the age of mobile computing October 25, 2017 - 9:26 pm As enterprise data centers evolve, networking also expands to unknown regions.
Going forward, companies will move beyond mobile devices and begin to implement Internet of Things (IoT) devices and applications that demand greater security on the edges where computing occurs.
Mobile computing devices are devices such as tablets, smart phones, e-readers, and laptop computers. The very features that make these devices useful (portability, access connectivity, data storage, ...
Any computing device that connects to the Internet is subject to cybercrime, but you can’t run a business without connecting devices to the Internet. So what’s a mobile security-conscious small ...