Our collection of stories in Android Secured last week included one about a team of researchers from… / Read More
Recently there have been some mixed messages on the future of BYOD programs in enterprises. Some numbers… / Read More
People often tend to think of security as one of the biggest impediments to the adoption of… / Read More
Three separate news items in Android Secured over the last few days highlight the challenges enterprises face… / Read More
From self-destructing smartphones and “tap-proof” mobile messaging software to malicious attacks and adware campaigns, this week’s roundup… / Read More
If you’ve been following the Inside BlackBerry Business Blog, you’ve heard at least a bit of talk… / Read More
Recently, a piece of iOS malware by the name of Keyraider stole the account information of over… / Read More
For those who just can’t get enough of industry surveys — and you know who you… / Read More
Last year, lawyers at a Chicago-based law firm and officials within the Indonesian government found themselves caught… / Read More
Making acquisitions generally indicates growth and change for an organization. It can be very exciting and lucrative.… / Read More
In May, a Californian woman sued her employer for firing her. Termination lawsuits are nothing new, but… / Read More
Everyone hates expense reports. Employees hate filling them out, and managers hate the lost productivity– an average… / Read More
When BlackBerry launched BES12, we introduced our most complete, simplified and secure mobility management platform yet. Since… / Read More
Employee satisfaction has always played an important role in the IT department’s mandate to enable a productive, growing business and protect corporate assets.
There’s an old saying that two heads are better than one. What if you had a lot… / Read More
The Enterprise Mobility Management market is zooming upwards, according to analyst Jack Gold, as enterprises continue to catch up with all of their workers’ devices.
What is the right thing to do when your C-level peers ask you to swap your mobile fleet (devices) and tools for something they fancy?
Last year it was reported that GOZeus (GameOver Zeus) and cryptolocker were two of the most malicious pieces of malware being used in cyber crimes against the financial industry. Banks were attacked and had hundreds of millions of dollars stolen from them.
“Wall of Sheep” sounds like an adorable Angry Birds clone involving woolly farm animals. But as I… / Read More
The conversation on mobile security is one that’s never going to end. There’s always going to be some new vulnerability in the press. It’s an unavoidable fact of life in enterprise. This situation isn’t helped along by the fact that most cloud storage solutions offer little in the way of security.