Protection

API development is the foundation of mobile enterprise

By Jonathan Crowl | Retail

When enterprises sit down to outline their mobile strategies, it's important that they prioritize API development early in the process. Read More

By Jonathan Crowl | Retail
Reporter

February 22, 2017

Retail technology requires businesses to increase in-store mobile security

By Karin KelleyRetail

While modern retail technology helps businesses cater to customers, there are major security concerns that retailers need to address. Read More

By Karin KelleyRetail
Independent Analyst & Writer

December 20, 2016

How to create a BYOD program that addresses healthcare industry needs

By Elisa SilvermanHealthcare

Hospitals and practices need a BYOD program to manage compatibility, security and compliance issues. Read More

By Elisa SilvermanHealthcare
Technology Writer

December 12, 2016

Enterprise device management: 4 key success principles

By Jonathan Hassell

Here are four ways IT senior management can successfully conduct enterprise device management within their organization. Read More

By Jonathan Hassell
President, 82 Ventures

November 11, 2016

Take action on these top 10 mobile application vulnerabilities now

By Patrick Fan

With the unique nature of mobile device and usage, there are some mobile application vulnerabilities that are not seen in traditional applications. Read More

By Patrick Fan
CEO / Founder of beNovelty

October 11, 2016

How to maintain mobile security in the face of global device churn

By Ian RobinsonRetail

The sudden emergence of new hardware and operating systems on mobile devices connected to the enterprise remains a major concern for mobile security. Read More

By Ian RobinsonRetail
IBM Mobile Portfolio Marketing Leader

September 14, 2016

More than mobile banking: How mobile is driving innovation in the financial sector

By Jonathan HassellBanking

Mobile innovation in the financial sector means more than just mobile banking. Read More

By Jonathan HassellBanking
President, 82 Ventures

September 12, 2016

Report: 5 insights into better information security policies

By Jonathan Hassell

Information security is a journey, not a destination, and you must enroll your employees early and often in order in order to strengthen practices. Read More

By Jonathan Hassell
President, 82 Ventures

September 8, 2016

NFC-based card emulation versus a light wallet: Which is best?

By Dr. Danny Fundinger

An issue within the development process of proximity mobile wallets is the choice between a light wallet and a full wallet with NFC-based card emulation. Read More

By Dr. Danny Fundinger
Managing Consultant at IBM Global Business Services

August 19, 2016

Load More
Newsletter Signup
Ten Rules For BYOD

MobilePhobia

Join us at #MWC2017!

Twitter