Please turn on your JavaScript for this page to function normally.
Detecting mobile device vulnerabilities using Nessus

This video by Paul Asadoorian shows you how to enable and use the Nessus plugins which identify mobile devices and vulnerabilities from your MDM (Mobile Device Management) servers.

Good Technology enhances enterprise mobility solutions

Good Technology announced the addition of Good Dynamics AppKinetics to its Good Dynamics platform, which helps protect enterprise data in transit, at rest, and in use on …

Enterprise grade, secure mobile file sharing

Accellion announced the latest version of native Accellion Mobile Apps which allow business users to collaborate and view more than 200 different file types, editing and …

Trend Micro Mobile Security 8.0 released

Trend Micro launched Trend Micro Mobile Security (TMMS) 8.0 which enhances the enforcement of existing password and encryption policies as well as provides more granular …

Real-time fraud prevention with PhoneID Contact

TeleSign announced the newest product in the PhoneID suite, which helps online businesses block fraud by delivering name and address details based on a phone number. PhoneID …

Send messages with file attachments in a secure environment

TigerText introduced the ability to send file attachments today through an API integration with Dropbox. TigerText users will now be able to securely and instantly send PDF, …

Blue Coat delivers mobile application controls

Blue Coat introduced mobile application controls that close the security gap created by unsanctioned mobile applications on the corporate network. The growth in bring your own …

The growing headache of protecting mobile devices

33 per cent of UK organizations foresee the protection of mobile devices in the workplace to be the biggest security headache they will encounter in the year ahead, according …

MIT unveils a new Internet protocol for mobile clients

By exchanging TCP with UDP, two MIT researchers have managed to create the State Synchronization Protocol (SSP) – a new Internet protocol more suited to establishing and …

8,000+ mobile devices left at top U.S. airports

Credant Technologies announced the results of their survey of top airports in the United States. In the last year, travelers left behind 8,016 mobile devices at seven of the …

Bootable USB flash drive for secure remote working

Cryptzone released AppGate MOVE (My Own Virtual Environment), a USB flash drive that provides a portable way to access information and applications securely from any computer. …

Removing the fear factor from BYOD

In May, HM Revenue and Customs (HMRC) said that it would ignore the government’s advice on BYOD (bring your own device) because of concerns around the security of the …

Don't miss

Cybersecurity news