mobile devices
Detecting mobile device vulnerabilities using Nessus
This video by Paul Asadoorian shows you how to enable and use the Nessus plugins which identify mobile devices and vulnerabilities from your MDM (Mobile Device Management) servers.
Good Technology enhances enterprise mobility solutions
Good Technology announced the addition of Good Dynamics AppKinetics to its Good Dynamics platform, which helps protect enterprise data in transit, at rest, and in use on …
Enterprise grade, secure mobile file sharing
Accellion announced the latest version of native Accellion Mobile Apps which allow business users to collaborate and view more than 200 different file types, editing and …
Trend Micro Mobile Security 8.0 released
Trend Micro launched Trend Micro Mobile Security (TMMS) 8.0 which enhances the enforcement of existing password and encryption policies as well as provides more granular …
Real-time fraud prevention with PhoneID Contact
TeleSign announced the newest product in the PhoneID suite, which helps online businesses block fraud by delivering name and address details based on a phone number. PhoneID …
Send messages with file attachments in a secure environment
TigerText introduced the ability to send file attachments today through an API integration with Dropbox. TigerText users will now be able to securely and instantly send PDF, …
Blue Coat delivers mobile application controls
Blue Coat introduced mobile application controls that close the security gap created by unsanctioned mobile applications on the corporate network. The growth in bring your own …
The growing headache of protecting mobile devices
33 per cent of UK organizations foresee the protection of mobile devices in the workplace to be the biggest security headache they will encounter in the year ahead, according …
MIT unveils a new Internet protocol for mobile clients
By exchanging TCP with UDP, two MIT researchers have managed to create the State Synchronization Protocol (SSP) – a new Internet protocol more suited to establishing and …
8,000+ mobile devices left at top U.S. airports
Credant Technologies announced the results of their survey of top airports in the United States. In the last year, travelers left behind 8,016 mobile devices at seven of the …
Bootable USB flash drive for secure remote working
Cryptzone released AppGate MOVE (My Own Virtual Environment), a USB flash drive that provides a portable way to access information and applications securely from any computer. …
Removing the fear factor from BYOD
In May, HM Revenue and Customs (HMRC) said that it would ignore the government’s advice on BYOD (bring your own device) because of concerns around the security of the …
Featured news
Resources
Don't miss
- CISA: Use Signal or other secure communications app
- Another NetWalker affiliate sentenced to 20 years in prison
- Why cybersecurity is critical to energy modernization
- Cryptocurrency hackers stole $2.2 billion from platforms in 2024
- CISA orders federal agencies to secure their Microsoft cloud environments