BYOD, CYOD, COPE and COBO. IT managers know there are many different ways to deploy and manage… / Read More
When we first built the internet, we could have never imagined that cybercrime would also cost our society nearly half a trillion dollars a year. Similarly, the Internet of Things (IoT) has incredible potential – and creates a tremendous new set of security risks.
Here’s a cautionary tale for anyone in the middle of a tablet deployment. In late 2013, several… / Read More
Arguably the most famous and mythical component of BlackBerry is the BlackBerry Infrastructure, a secure global network that transmits petabytes of encrypted data to and from the world’s most powerful mobile professionals. This network is just one part of the BlackBerry Corporate Infrastructure, the environment where BlackBerry builds secure solutions for millions of customers, from military-grade smartphones to industry-leading Enterprise Mobility Management. Today we’re happy to announce the release of the first ever BlackBerry Corporate Infrastructure Security Overview.
AT&T and BlackBerry have a long history — the carrier was the first to launch a BlackBerry… / Read More
When you think about security, “user-friendly” probably isn’t the first term that comes to mind. Digital security is complicated, confusing and sometimes nearly impossible to understand. This leads to two common misconceptions. Let’s go ahead and burst those myths.
Big news this past week that U.S. President Barack Obama’s sensitive (but unclassified) e-mails were accessed by Russian hackers. It is surprising this news is surprising.
(This is a guest post by Scott Ashdown, senior product manager for Enterprise Identity at BlackBerry.) A… / Read More
It was a busy Tuesday at BlackBerry as the company made a series of security-themed announcements at… / Read More
RSA is one of the world’s top security conferences and BlackBerry is always a big part of… / Read More
Two-factor authentication still offers superior protection for accounts, especially cloud services and personal e-mail used to transfer work files for access at home. There’s a more reliable way to offer two-factor authentication then one-time-password hardware tokens or text messages, though.
Last month, we announced the availability of BES12 Cloud. For SMBs looking to mobility to help start… / Read More
As my boxing coach used to say, if you want to punch someone in the face you… / Read More
This past winter has been one of the worst in recent years for winter storms; even that… / Read More
One of the great things about working at BlackBerry is being able to chat with world-class security… / Read More
A new BBM Protected feature gives you a leg up on your competition, while protecting you and your customers,… / Read More
Hillary Clinton’s alleged use of a personal e-mail account for sensitive government communication has received lots of… / Read More
You are what you wear: Although there was a great deal of fanfare surrounding the launch of… / Read More
It is generally accepted that mobile operating systems were developed with more security in mind than their… / Read More
As much as I dislike when people overdramatize serious situations, I do believe that it’s not a… / Read More