Home > RSS Feeds > Mobility
  • Integrating context-aware services with collaboration tools can improve the way companies share ideas, resolve issues and provide excellent customer service.

  • "It's all about the apps." We've all heard this increasingly popular catchphrase, which has become a part of the lexicon of today's mobile-crazed society. But whereas those five words were once a declaration of the value apps brought to smartphones, they now could very easily carry a more sinister meaning because mobile apps have become a favorite target of cyber-criminals. Increasingly, mobile apps—in particular, those running on Google's Android operating systems—are where bad guys are doing their sneakiest work by attempting to hijack users' phones, and the data therein, using the very apps they've downloaded by choice. Such is the takeaway from a new study from app-security vendor Arxan Technologies. "With smartphones routinely collecting a treasure trove of personal information about their owners, Android and iOS users are key targets for cyber-criminals," warns Mike Dager, CEO of Arxan Technologies. "Both platforms show increases in security breaches, but the key insight is that mobile app developers can't afford to ignore Android vulnerabilities in particular, with close to 100 percent of Android apps getting hacked."

  • Over the last few years, mobility has radically redefined enterprise IT. It has introduced new requirements, new demands, and the need for entirely new technology platforms and connection points. A recent report from Check Point Software Technologies and Dimensional Research, "The Impact of Mobile Devices on Information Security: a Survey of IT and Security Professionals," states that bring-your-own-device (BYOD) initiatives and other mobile tools and approaches are ratcheting up risks, as well as costs. Among other things, the global survey of 706 IT and security professionals found that about 95 percent of their organizations have mobile devices accessing their networks, but IT and security strategies are significantly lagging. What's more, many of the problems that organizations face concerning mobile security are the direct result of lax governance and careless employees. Consequently, breaches and other incidents are on the rise, and the potential exposure and impact of these events continues to grow. Here's a list of some of the key findings from the mobile security survey.

  • The technologies you should keep an eye on during 2015 include smart watches, mobile wallets, virtual assistants, biometrics, and smart homes and buildings.