Mobile security
Modern security tools can cover all sorts of devices, but mobile devices present threat vectors, privacy issues and security challenges that aren't common elsewhere. For example, device loss and theft can occur much easier with mobile devices than with PCs. Find out what considerations IT must consider when building a mobile security plan.
Top Stories
-
Tip
30 Sep 2024
Should you consider open source mobile device management?
Determine whether the open source route is best when it comes to managing mobile devices. To start, weigh the pros and cons, and then evaluate the market. Continue Reading
-
Tip
19 Sep 2024
How to implement a mobile device management project plan
With mobile device management software, IT can better support corporate smartphones, laptops and other mobile endpoints. Learn how to build a project plan for MDM implementation. Continue Reading
By- Helen Searle-Jones, Tritech Group
-
Definition
01 Oct 2024
What is an SSID (service set identifier)?
An SSID (service set identifier) is a sequence of characters that uniquely names a Wi-Fi network. An SSID is sometimes referred to as a network name. Continue Reading
By- Nick Barney, Technology Writer
- Alexander S. Gillis, Technical Writer and Editor
- Lisa Phifer, Core Competence
-
Tip
30 Sep 2024
Should you consider open source mobile device management?
Determine whether the open source route is best when it comes to managing mobile devices. To start, weigh the pros and cons, and then evaluate the market. Continue Reading
-
Definition
30 Sep 2024
What is WPA3 (Wi-Fi Protected Access 3)?
WPA3, also known as Wi-Fi Protected Access 3, is the third iteration of a security certification standard developed by the Wi-Fi Alliance. WPA3 is the latest updated implementation of WPA2, which has been in use since 2004. Continue Reading
By- Gavin Wright
- Alexander S. Gillis, Technical Writer and Editor
-
Tip
19 Sep 2024
How to implement a mobile device management project plan
With mobile device management software, IT can better support corporate smartphones, laptops and other mobile endpoints. Learn how to build a project plan for MDM implementation. Continue Reading
By- Helen Searle-Jones, Tritech Group
-
Tip
10 Sep 2024
8 key aspects of a mobile device security audit program
Auditing is a crucial part of mobile device security, but IT admins must ensure their approach is thorough and consistent. Learn what aspects make up a mobile device audit program. Continue Reading
By- Michael Goad, CDW
-
Tip
03 Sep 2024
4 mPOS apps to turn a mobile device into a payment terminal
With the right software, almost any mobile device can be a payment terminal. Learn about the mobile point-of-sale options beyond Tap to Pay on iPhone and Tap to Pay on Android. Continue Reading
By -
Definition
27 Aug 2024
What is LDAP (Lightweight Directory Access Protocol)?
LDAP (Lightweight Directory Access Protocol) is a software protocol used for locating data about organizations, individuals and other resources, such as files and devices, on public and corporate networks. Continue Reading
By- Cameron Hashemi-Pour, Site Editor
- Alexander S. Gillis, Technical Writer and Editor
-
Definition
16 Aug 2024
What is an endpoint protection platform (EPP)?
An endpoint protection platform (EPP) is a security technology that safeguards endpoint devices. Continue Reading
-
Tip
12 Aug 2024
How to conduct a mobile app security audit
To keep corporate and user data safe, IT must continuously ensure mobile app security. Mobile application security audits are a helpful tool to stay on top of data protection. Continue Reading
By -
Tip
07 Aug 2024
12 types of endpoint security
With the rise of remote work, mobile devices and IoT, the traditional security perimeter extends beyond corporate networks, making endpoint security crucial for organizations. Continue Reading
-
Answer
01 Aug 2024
Can you accept credit card payments on an Android phone?
Many consumers prefer contactless payments, and vendors can easily enable them with a smartphone and the right software. Learn how to set up an Android to accept customer payments. Continue Reading
By- Katie Fenton, Associate Site Editor
-
Definition
26 Jul 2024
What is malware? Prevention, detection and how attacks work
Malware, or malicious software, is any program or file that's intentionally harmful to a computer, network or server. Continue Reading
By- Kinza Yasar, Technical Writer
- Ben Lutkevich, Site Editor
-
Tip
24 Jul 2024
Set up Tap to Pay: How to accept payments with an iPhone
Tap to Pay makes it possible to accept customer payments from an iPhone with no additional hardware. Find out the best use cases for Tap to Pay and how to implement it. Continue Reading
By -
Tip
19 Jul 2024
Why mobile security audits are important in the enterprise
Mobile devices bring their own set of challenges and risks to enterprise security. To handle mobile-specific threats, IT should conduct regular mobile security audits. Continue Reading
By- Michael Goad, CDW
-
News
14 Jun 2024
Security pros grade Apple Intelligence data privacy measures
Apple has built a Private Cloud Compute server to process and then delete data sent from Apple Intelligence running on an iPhone, iPad or Mac. Apple says it won't store any data. Continue Reading
By- Antone Gonsalves, News Director
-
Definition
23 May 2024
wireless intrusion prevention system (WIPS)
A wireless intrusion prevention system (WIPS) is a dedicated security device or integrated software application that monitors a wireless local area network (WLAN) or Wi-Fi network's radio spectrum for rogue access points (APs) and other wireless threats. Continue Reading
By -
Definition
17 May 2024
hashing
Hashing is the process of transforming any given key or a string of characters into another value. Continue Reading
By- Kinza Yasar, Technical Writer
- Andrew Zola
-
Tip
14 May 2024
4 steps to ensure mobile payment security
Mobile payments are popular for their convenience, but are they secure? IT must put best practices in place to keep sensitive information safe during the mobile payment process. Continue Reading
By -
Tip
01 May 2024
How to deploy Intune compliance policies for iOS and iPadOS
Compliance policies are a significant part of IT's device management, so admins should learn about Intune's compliance management features for all types of devices. Continue Reading
By- Michael Goad, CDW
-
Tip
01 May 2024
3 best enterprise mobile app authentication methods
Mobile app authentication is a foundational security strategy for remote and hybrid workforces. Learn how to choose between passwords, multifactor authentication and biometrics. Continue Reading
By -
Feature
29 Apr 2024
How to create a mobile device security policy, with template
A well-defined mobile device security policy should educate employees on the proper use of BYODs and set clear standards for end users and IT administrators alike. Continue Reading
By- Michael Goad, CDW
- Reda Chouffani, Biz Technology Solutions
-
Tip
19 Apr 2024
4 types of mobile security models and how they work
Learn about the different mobile security models that organizations can choose from and how vendors combine cloud-based threat defense with on-device security. Continue Reading
By- Michael Goad, CDW
- Jack Gold, J.Gold Associates, LLC.
-
Feature
04 Apr 2024
The ultimate guide to mobile device security in the workplace
Mobile devices provide connectivity for employees to access business data and communicate with colleagues, but these unique benefits come with specific security challenges for IT. Continue Reading
By- John Powers, Senior Site Editor
-
Tip
01 Apr 2024
Top 4 mobile security threats and challenges for businesses
Mobile devices are a target for hackers, with several ways to steal data. These threats -- from network spoofing to phishing texts -- endanger organizations as much as individuals. Continue Reading
By- Michael Goad, CDW
-
Feature
28 Mar 2024
What BYOD trends will take hold in the business world?
As employees and organizations come to expect greater mobility, BYOD is an important consideration in the successful planning and execution of the remote and hybrid workplace. Continue Reading
By- Will Kelly
- Reda Chouffani, Biz Technology Solutions
-
Feature
12 Mar 2024
7 mobile device security best practices for businesses
Organizations can't deploy mobile devices without accounting for their security. IT admins should follow these seven best practices to manage mobile device and data security. Continue Reading
By- Michael Goad, CDW
-
Definition
06 Mar 2024
robocall
Robocalls are automated telephone calls that deliver a recorded message. Continue Reading
By- Ben Lutkevich, Site Editor
-
Definition
27 Feb 2024
computer forensics (cyber forensics)
Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law. Continue Reading
By- Rahul Awati
- Ben Lutkevich, Site Editor
-
Tip
23 Feb 2024
How to set up Apple Pay for a business
Setting up Apple Pay is a simple process, but IT decision-makers should understand the considerations that come with it and how it varies for organizations of different sizes. Continue Reading
By -
Definition
09 Feb 2024
cyberterrorism
Cyberterrorism is usually defined as any premeditated, politically motivated attack against information systems, programs, and data that threatens violence or results in violence. Continue Reading
-
Definition
09 Feb 2024
mobile security (wireless security)
Mobile security, also known as wireless security, refers to the measures taken to protect smartphones, tablets, laptops, smartwatches and other portable computing devices and the networks they connect to, from threats and vulnerabilities associated with wireless computing. Continue Reading
By- Kinza Yasar, Technical Writer
- Brien Posey
- Ivy Wigmore
-
Definition
06 Feb 2024
dictionary attack
A dictionary attack is a method of breaking into a password-protected computer, network or other IT resource by systematically entering every word in a dictionary, or word list, as a password. Continue Reading
By -
Feature
31 Jan 2024
Finding the best mobile hotspot option for remote work
Organizations that allow the use of mobile hotspots for remote work must know how personal hotspots and dedicated hotspot devices differ. Compare these hotspot options. Continue Reading
By -
Definition
23 Jan 2024
BYOD (bring your own device)
BYOD (bring your own device) is a policy that enables employees in an organization to use their personally owned devices for work-related activities. Continue Reading
By- Kinza Yasar, Technical Writer
- Reda Chouffani, Biz Technology Solutions
-
Definition
19 Jan 2024
security incident
A security incident is an event that could indicate that an organization's systems or data have been compromised or that security measures put in place to protect them have failed. Continue Reading
By- Kinza Yasar, Technical Writer
- Mary E. Shacklett, Transworld Data
- Ivy Wigmore
-
Tip
17 Jan 2024
How do personal hotspots work for remote work?
A personal hotspot can be a valuable element of a remote work strategy, but IT teams must understand how they work and what management challenges they present. Continue Reading
By -
Definition
19 Dec 2023
unlocked cell phone
An unlocked cell phone is a cellular telephone that can be used with more than one service provider, allowing a user the flexibility to switch between different networks. Continue Reading
-
Tip
08 Dec 2023
Improve mobile hotspot security in 5 steps
Users might not hesitate to connect to a mobile hotspot, but that doesn't mean IT should always allow it. Learn the threats these hotspots pose and how to handle them. Continue Reading
By- John Powers, Senior Site Editor
- Matt Schulz
-
Definition
21 Nov 2023
possession factor
The possession factor, in a security context, is a category of user authentication credentials based on items that the user has with them, typically a hardware device such as a security token or a mobile phone used in conjunction with a software token. Continue Reading
By -
Definition
16 Nov 2023
Automated Clearing House fraud (ACH fraud)
ACH fraud is the theft of funds through the U.S. Department of the Treasury's Automated Clearing House financial transaction network. Continue Reading
By -
Feature
15 Nov 2023
Digital footprint management: Tools, laws and strategies
Digital footprint management can be hard with the abundance of apps that collect consumer data. Data privacy apps simplify the process, according to state laws. Continue Reading
By- Ben Lutkevich, Site Editor
-
Tip
13 Nov 2023
What should admins know about Microsoft Entra features?
Microsoft Entra combines new and existing cloud-based products and packages them under a new name. Learn how this change affects identity access management in your organization. Continue Reading
By -
Definition
03 Nov 2023
Common Vulnerabilities and Exposures (CVE)
Common Vulnerabilities and Exposures (CVE) is a publicly listed catalog of known security threats. Continue Reading
By -
Definition
01 Nov 2023
authentication
Authentication is the process of determining whether someone or something is who or what they say they are. Continue Reading
By- Nick Barney, Technology Writer
- Mary E. Shacklett, Transworld Data
- Linda Rosencrance
-
Definition
30 Oct 2023
supercookie
A supercookie is a type of tracking cookie inserted into an HTTP header to collect data about a user's internet browsing history and habits. Continue Reading
By- Rahul Awati
- Madelyn Bacon, TechTarget
-
Definition
18 Oct 2023
Google Authenticator
Google Authenticator is a mobile security application that provides a second type of confirmation for websites and online services that use two-factor authentication (2FA) to verify a user's identity before granting him or her access to secure resources. Continue Reading
-
Definition
02 Oct 2023
multifactor authentication
Multifactor authentication (MFA) is an account login process that requires multiple methods of authentication from independent categories of credentials to verify a user's identity for a login or other transaction. Continue Reading
By- Kinza Yasar, Technical Writer
- Mary E. Shacklett, Transworld Data
-
Definition
29 Sep 2023
cyber insurance
Cyber insurance, also called cyber liability insurance or cybersecurity insurance, is a contract an entity can purchase to help reduce the financial risks associated with doing business online. Continue Reading
By- Kinza Yasar, Technical Writer
-
Tip
25 Sep 2023
Are iPhones more secure than Android devices?
Apple has built a reputation for strong device security, but reputation alone can't protect corporate data. While iOS and Android differ, mobile security comes down to management. Continue Reading
By- Michael Goad, CDW
-
Definition
05 Sep 2023
email security
Email security is the process of ensuring the availability, integrity and authenticity of email communications by protecting against unauthorized access and email threats. Continue Reading
By- Kinza Yasar, Technical Writer
- Sean Michael Kerner
-
Definition
23 Aug 2023
network vulnerability scanning
Network vulnerability scanning is the process of inspecting and reporting potential vulnerabilities and security loopholes on a computer, network, web application or other device, including firewalls, switches, routers and wireless access points. Continue Reading
By- Kinza Yasar, Technical Writer
-
Definition
21 Aug 2023
risk analysis
Risk analysis is the process of identifying and analyzing potential issues that could negatively impact key business initiatives or projects. Continue Reading
By- Kinza Yasar, Technical Writer
- Linda Rosencrance
-
Tip
08 Aug 2023
5 steps to ensure HIPAA compliance on mobile devices
IT must implement several measures to comply with HIPAA, and mobile devices can add further complexity to this process. Follow these important steps for mobile HIPAA compliance. Continue Reading
By- Michael Goad, CDW
-
Definition
07 Aug 2023
IoT security (internet of things security)
IoT security (internet of things security) is the technology segment focused on safeguarding connected devices and networks in IoT. Continue Reading
By- Kinza Yasar, Technical Writer
- Sharon Shea, Executive Editor
- Ivy Wigmore
-
Tip
25 Jul 2023
5 steps to approach BYOD compliance policies
It can be difficult to ensure BYOD endpoints are compliant because IT can't configure them before they ship to users. Admins must enforce specific policies to make up for this. Continue Reading
By- Will Kelly
- Mike Chapple, University of Notre Dame
-
Definition
18 Jul 2023
cyber extortion
Cyber extortion is a crime involving an attack or threat of an attack coupled with a demand for money or some other response in return for stopping or remediating the attack. Continue Reading
By- Kinza Yasar, Technical Writer
-
Tip
13 Jun 2023
How to address mobile compliance in a business setting
When organizations plan for compliance and data security, they need to consider mobile devices due to their proliferation in a business setting and how easy it is to lose them. Continue Reading
By- Will Kelly
- Jack Gold, J.Gold Associates, LLC.
-
Definition
22 May 2023
API security
Application program interface (API) security refers to policies and procedures that protect APIs against malicious attacks and vulnerabilities. Continue Reading
By- Kinza Yasar, Technical Writer
-
Definition
15 May 2023
remote wipe
Remote wipe is a security feature that allows a network administrator or device owner to send a command that remotely deletes data from a computing device. Continue Reading
By- Alexander S. Gillis, Technical Writer and Editor
- Ben Lutkevich, Site Editor
-
Definition
25 Apr 2023
smishing (SMS phishing)
Smishing -- or Short Message Service (SMS) phishing -- is a social engineering tactic cybercriminals use to trick people into divulging sensitive information over text messages. Continue Reading
By- Kinza Yasar, Technical Writer
-
Definition
19 Apr 2023
firewall
A firewall is a network security device that prevents unauthorized access to a network. It inspects incoming and outgoing traffic using a set of security rules to identify and block threats. Continue Reading
By- Kinza Yasar, Technical Writer
- Ben Lutkevich, Site Editor
-
Tip
17 Apr 2023
How to detect and remove malware from an iPhone
Despite their reputation for security, iPhones are not immune from malware attacks. IT and users should learn the signs of mobile malware and the steps to take when they appear. Continue Reading
By- Michael Goad, CDW
-
Tip
14 Apr 2023
How to detect and remove malware from an Android device
Mobile malware can come in many forms, but users might not know how to identify it. Understand the signs of malware on mobile devices, as well as what to do to remove the threat. Continue Reading
By- Michael Goad, CDW
-
Definition
12 Apr 2023
Active Directory Federation Services (AD FS)
Active Directory Federation Services (AD FS) is a feature of the Windows Server operating system (OS) that extends end users' single sign-on (SSO) access to applications and systems outside the corporate firewall. Continue Reading
-
Definition
06 Apr 2023
war driving (access point mapping)
War driving, also called access point mapping, is the act of locating and possibly exploiting connections to wireless local area networks (WLANs) while driving around a city or elsewhere. Continue Reading
By -
Tip
04 Apr 2023
How to protect mobile devices from malware in the enterprise
Smartphones can be just as susceptible to cybersecurity threats as desktops, so it's important for organizations to know how to protect their endpoints from mobile malware. Continue Reading
By- Michael Goad, CDW
-
Definition
03 Apr 2023
Temporal Key Integrity Protocol (TKIP)
Temporal Key Integrity Protocol (TKIP) is an encryption protocol included in the Institute of Electrical and Electronics Engineers (IEEE) 802.11i standard for wireless local area networks (WLANs). Continue Reading
By -
Definition
17 Mar 2023
bluesnarfing
Bluesnarfing is a hacking technique in which a hacker accesses a wireless device through a Bluetooth connection. Continue Reading
By -
Tip
01 Mar 2023
How to ensure iPhone configuration profiles are safe
Configuration profiles make it easier to manage BYOD iPhones, but they're also associated with malware. Mobile security policies can ensure configuration profiles are safe. Continue Reading
By -
Tip
23 Feb 2023
How to remove a management profile from an iPhone
User Enrollment creates a management profile for BYOD iPhones, but IT must remove that data in cases such as device loss or theft. Learn how to do this with a selective wipe. Continue Reading
By- Peter van der Woude, InSpark
-
Definition
21 Feb 2023
mobile malware
Mobile malware is malicious software specifically written to attack mobile devices such as smartphones, tablets, and smartwatches. Continue Reading
-
Definition
13 Feb 2023
passwordless authentication
Passwordless authentication is signing into a service without using a password. Continue Reading
By- Gavin Wright
- Alexander S. Gillis, Technical Writer and Editor
-
News
02 Feb 2023
Samsung seeks bigger role as a business mobile provider
Samsung's wide variety of mobile devices, partnerships with software makers and government-grade security are differentiators in the business market, analysts said. Continue Reading
By- Antone Gonsalves, News Director
-
Definition
16 Dec 2022
GPS jamming
GPS jamming is the act of using a frequency transmitting device to block or interfere with radio communications. Continue Reading
By -
News
27 Sep 2022
Jamf to acquire ZecOps to bolster iOS security
Jamf will pay an undisclosed sum for ZecOps, which logs activity on iOS devices to find potential attacks. The companies expect the deal to close by 2023. Continue Reading
By- Mike Gleason, News Writer
-
News
23 Sep 2022
Microsoft focuses on remote security with Windows 11 update
Microsoft's Windows 11 2022 Update includes features for protecting sensitive corporate data and helping remote workers avoid malware and phishing attacks. Continue Reading
By- Antone Gonsalves, News Director
-
Tip
25 Aug 2022
Preventing attacks on mobile applications in the enterprise
As mobile devices gain popularity as enterprise devices, mobile apps become a greater target for hackers. Understand the risks that come with mobile apps and how to mitigate them. Continue Reading
By -
Tip
05 Aug 2022
Understanding QR code security issues for enterprise devices
QR codes have many uses for organizations and their employees, but cybercriminals can take advantage of them, too. IT should keep these risks in mind and learn how to avoid them. Continue Reading
By -
Tip
27 Jul 2022
How mobile firewalls protect against unique threat vectors
Firewalls are an essential part of network security. As more employees use mobile devices for work, mobile firewalls are an increasingly vital security tool for enterprises. Continue Reading
By- Reda Chouffani, Biz Technology Solutions
-
Tip
13 Jul 2022
How to perform a full remote wipe on an Android device
When a device is lost or no longer needed for work purposes, a remote wipe can keep corporate data secure. This is a vital safeguard for mobile Android devices in the workplace. Continue Reading
By- Peter van der Woude, InSpark
-
Feature
13 Jul 2022
8 top digital wallet companies
Digital wallets offer more security and convenience to consumers, with the flexibility to pay from mobile devices. Continue Reading
By- Amanda Hetler, Senior Editor
-
Definition
12 May 2022
consumerization of IT
The consumerization of IT refers to how software and hardware products designed for personal use migrated into the enterprise and were used for work purposes. Continue Reading
By- George Lawton
- Linda Tucci, Industry Editor -- CIO/IT Strategy
-
Definition
12 May 2022
Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE) is a security policy management platform that provides secure network access to users and devices. Continue Reading
By- Alexander S. Gillis, Technical Writer and Editor
-
Opinion
26 Apr 2022
How to sideload iOS apps and why it's dangerous
IT professionals should be aware of how to sideload iOS applications and why it might be dangerous and inadvisable to do so. Learn the two most common sideload methods below. Continue Reading
By- Kyle Johnson, Technology Editor
-
Definition
14 Apr 2022
RPC over HTTP
Remote Procedure Call over HTTP (RPC over HTTP) is a Microsoft protocol that enables Microsoft Outlook clients to access Microsoft Exchange servers over HTTP. Continue Reading
By -
News
17 Mar 2022
Cisco adds ML to Meraki cameras to track objects
Cisco's MV Sense is available as a subscription with Meraki MV cameras. Companies can use the service to count boxes in a warehouse or track equipment on a factory floor. Continue Reading
By- Mike Gleason, News Writer
-
Definition
15 Mar 2022
location-based service (LBS)
A location-based service (LBS) is a software service for mobile device applications that requires knowledge about where the mobile device is geographically located. Continue Reading
By- Andrew Froehlich, West Gate Networks
-
Feature
14 Mar 2022
The story of mobile phishing through statistics
Mobile phishing is a significant threat, and there are many statistics that back this up. Find out what these numbers mean and how they should affect mobile security strategy. Continue Reading
By- Michael Goad, CDW
-
Definition
11 Mar 2022
Wireless Transport Layer Security (WTLS)
Wireless Transport Layer Security (WTLS) is a security level for the Wireless Application Protocol (WAP), specifically for the applications that use WAP. Continue Reading
By -
News
04 Mar 2022
HP brings device management to VR headsets
HP's SaaS product lets businesses using HTC and Pico virtual reality headsets track device locations, push application updates, patch devices and set security policies. Continue Reading
-
Tip
17 Feb 2022
How text message phishing can affect the enterprise
Text phishing, or smishing, is an increasing occurrence across enterprises. However, IT can neutralize this threat with the right policies and practices. Continue Reading
By -
Tip
08 Feb 2022
Protecting mobile devices from text-based phishing
Phishing emails often get IT teams' attention, but text-based phishing is a growing threat. Organizations must understand the risks of mobile phishing and how to prevent it. Continue Reading
By- Reda Chouffani, Biz Technology Solutions
-
Tip
04 Jan 2022
3 BYOD security risks and how to prevent them
A BYOD model offers convenience and flexibility, but it also creates security concerns. Here are the key mobile BYOD security risks that IT should consider and how to manage them. Continue Reading
By -
Tip
16 Jul 2021
How to deploy a mobile threat defense app in 3 scenarios
The mobile threat defense integration and application deployment process differ depending on whether an organization uses MDM, MAM or neither. Continue Reading
By- Peter van der Woude, InSpark
- Colm Warner
-
Tip
14 Jul 2021
Determining the best mobile threat defense options
Desktop security products often cannot cover mobile devices enough. Mobile threat defense can come into the picture and supplement an organization's mobile security. Continue Reading
By- Jack Gold, J.Gold Associates, LLC.
-
Definition
20 May 2021
Mobile Threat Defense (MTD)
Mobile Threat Defense (MTD) software is meant to protect organizations and individual users from security threats on mobile platforms. Continue Reading
By- Brien Posey
- Alexander S. Gillis, Technical Writer and Editor
-
Tip
09 Oct 2020
Learn 5 Microsoft Intune security features for mobile admins
Intune admins must be familiar with all the most essential security features that the platform offers. Learn about features such as conditional access and MTD integrations below. Continue Reading
By- Peter van der Woude, InSpark
-
Answer
21 May 2020
Should IT consider NIAP-certified products for MDM?
The average organization may not require military-grade security for its endpoint management platform, but IT pros should take note of which products meet that standard. Continue Reading
-
Opinion
25 Mar 2020
A look at MTD vendor Zimperium, and their new product suite, MAPS
Zimperium's MAPS provide organizations with a way to protect apps from development to after it hits app stores. Continue Reading
By- Kyle Johnson, Technology Editor
-
Opinion
19 Mar 2020
What IT needs to know about FIDO2 iOS and Android standards
The FIDO2 standard can help organizations go passwordless, but IT should understand how exactly an application or website offers this possibility through the WebAuthn API. Continue Reading
By- Kyle Johnson, Technology Editor