With the proliferation of mobile apps, their security becomes critical: apps store and transmit a lot of sensitive user data. This data can be vulnerable due to weak encryption, insecure storage, and ...
Mobile broadband devices will be subject to the security problems that have long plagued PCs, said a panel of security experts at this week’s Mobile Internet World conference. You’re in for a nasty ...
Curious how IT teams protect data without getting in the way? Here’s a quick read on how Samsung Galaxy and Knox Suite do it.
The Tea app breach highlights how weak back-end security can expose sensitive user data. Learn essential strategies for access control, data lifecycle management and third-party risk reduction.
No other device in recent history has become more ubiquitous and pervasive as the mobile phone. It is now possible to blog or twitter from your mobile phone. Many Kenyans have been seduced by the ...
Today, the future of work will be defined less by where people sit and more by how securely and freely they can work from the devices they already own.
Expertise from Forbes Councils members, operated under license. Opinions expressed are those of the author. Mobile security has long been an afterthought in enterprise environments. While we’ve ...
DALLAS, March 6 /PRNewswire/ -- CREDANT Technologies, a leading provider of mobile data protection solutions, today announced version 5.1 of its flagship product, CREDANT Mobile Guardian Enterprise ...
It happened again. Another stolen laptop has put private information at risk. This time it is the private health information and Social Security numbers of almost 4,000 patients of the M.D. Anderson ...
Roughly four years ago, T-Mobile suffered a massive data breach that affected more than 76 million customers. Hackers gained access to personal data including names, birthdays, addresses, driver’s ...
In what appears to be the latest in a series of T-Mobile security breaches, customers are reporting that they are seeing the personal data of other users when logged into their accounts. Data ...