Protection

Retail technology requires businesses to increase in-store mobile security

By Karin Kelley | Retail

While modern retail technology helps businesses cater to customers, there are major security concerns that retailers need to address. Read More

By Karin Kelley | Retail
Independent Analyst & Writer

December 20, 2016

How to create a BYOD program that addresses healthcare industry needs

By Elisa SilvermanHealthcare

Hospitals and practices need a BYOD program to manage compatibility, security and compliance issues. Read More

By Elisa SilvermanHealthcare
Technology Writer

December 12, 2016

Enterprise device management: 4 key success principles

By Jonathan Hassell

Here are four ways IT senior management can successfully conduct enterprise device management within their organization. Read More

By Jonathan Hassell
President, 82 Ventures

November 11, 2016

Take action on these top 10 mobile application vulnerabilities now

By Patrick Fan

With the unique nature of mobile device and usage, there are some mobile application vulnerabilities that are not seen in traditional applications. Read More

By Patrick Fan
CEO / Founder of beNovelty

October 11, 2016

How to maintain mobile security in the face of global device churn

By Ian RobinsonRetail

The sudden emergence of new hardware and operating systems on mobile devices connected to the enterprise remains a major concern for mobile security. Read More

By Ian RobinsonRetail
MobileFirst Portfolio Marketing Leader at IBM

September 14, 2016

More than mobile banking: How mobile is driving innovation in the financial sector

By Jonathan HassellBanking

Mobile innovation in the financial sector means more than just mobile banking. Read More

By Jonathan HassellBanking
President, 82 Ventures

September 12, 2016

Report: 5 insights into better information security policies

By Jonathan Hassell

Information security is a journey, not a destination, and you must enroll your employees early and often in order in order to strengthen practices. Read More

By Jonathan Hassell
President, 82 Ventures

September 8, 2016

NFC-based card emulation versus a light wallet: Which is best?

By Dr. Danny Fundinger

An issue within the development process of proximity mobile wallets is the choice between a light wallet and a full wallet with NFC-based card emulation. Read More

By Dr. Danny Fundinger
Managing Consultant at IBM Global Business Services

August 19, 2016

Fingerprint scanner or passcode: Which is more secure for the enterprise

By Martin Keen

Unauthorized access to a mobile device containing confidential enterprise data can be serious. What's the best way to protect your enterprise data? Read More

By Martin Keen
IBM Technical Content Services Project Leader

July 26, 2016

Load More
Newsletter Signup
MobilePhobia

Ten Rules For BYOD

Twitter