Endpoint March 2, 2015 How to Permanently Secure Mobile Temp Workers 3 min read - Organizations need to keep mobile security in mind when letting temp workers take advantage of company-wide bring-your-own-device policies.
Software Vulnerabilities February 28, 2015 IBM Application Security on Cloud Saves the Day 2 min read - With AppScan Mobile Analyzer, IBM found vulnerabilities in the Apache Cordova framework for mobile apps that enabled a remote drive-by exploitation attack.
Endpoint February 24, 2015 Philosophy vs. Reality: How IBM Achieves Mobile Security for 400,000 Employees 3 min read - Most companies today, including IBM, face the challenge of managing and securing mobile devices. Learn how IBM protects its workforce of 400,000 employees.
Endpoint February 23, 2015 The Four Pillars of Mobile Security 2 min read - When it comes to mobile security, many of us have simply decided convenience is worth the risk of our data ending up in the wrong hands.
Identity & Access February 19, 2015 Securing Digital Identity in the Era of Cloud and Mobile 2 min read - As traditional perimeter defenses prove to be inefficient in the era of the cloud and mobile, organizations are focusing on securing the digital identity.
Endpoint February 19, 2015 Can You Trust it? Mobile Authentication Must Become Context- and Risk-Aware 3 min read - Organizations' mobile authentication methods must take risk levels and context into account in order to determine whether device access is legitimate.
Application Security February 11, 2015 Four Tips for Protecting the Enterprise Against Mobile App Threats 3 min read - As mobile app threats continue to increase in complexity, organizations should follow these four tips to keep their data and users safe.
Software Vulnerabilities February 11, 2015 A Perfect Match: Uniting Mobile Security With Your Employees’ Use of Online Dating Apps 5 min read - A new IBM report details potential vulnerabilities in many popular dating apps that could negatively affect your organization's mobile security.
Endpoint February 10, 2015 Mobile Threats Underline Mobile Security Challenges 2 min read - Recent mobile security vulnerabilities faced by Verizon and AT&T point to the scope and variety of mobile threats and how firms are responding to them.
Intelligence & Analytics February 9, 2015 Do We Need New Security Tools for the IoT? 3 min read - As the IoT becomes more prevalent, enterprises must improve their mobile device protection programs by strengthening their security controls.