As we gaze at the crystal ball – or rather the crystal cloud – for the mobile industry in 2013, we see some significant technologies and trends that have the potential to transform
If your organization has valuable data, assume someone is going to come after it in 2013 through mass market attacks that provide cover for targeted attacks.
There is an untapped big data gap. Only .5 % of data is currently analyzed by companies to help them make decisions. IDC's latest Digital Universe Study sponsored by EMC showed that in 2012, 23% of the information in the digital universe (or 643 exabytes) would...
Mobile device management, mobile app management (MAM), container-based apps, mobile virtualization, mobile backend as a service (MbaaS), network access control (NAC) and software-defined networking (SDN) are some of the various approaches that companies are using to manage fast-paced mobility adoption, according to a new...
Mobile applications undermine conventional online controls against fraud but open up several much stronger controls – although they are dependent on a deep understanding of mobile and fraud.
Malicious mobile apps, government-sponsored attacks and sandbox avoidance are among seven major cybersecurity threats predicted by Websense Security Labs for 2013. The company recently released its 2013 threat landscape and noted that cybercriminals gained confidence and momentum in 2012.
According to Websense Security Labs vice president,...
Earlier this year, the CEO of IBM's Brazilian unit said that more time is needed to understand the impact of mobile devices on corporate business, but that hasn't stopped IBM from acting. The company recently announced new software and service additions to its mobile enterprise suite.
This...
The prevalence of “iDevices,”the bring-your-own-devices (BYOD) trend and the shift from Blackberry to Apple and Google devices are among the major challenges to mobile security today. “BYOD has changed it fundamentally,” said John McCormack, global president of Websense.
McCormack talked with RCR Wireless News during this...
Among the many buzzwords in the IT world, BYOD was one of the most talked about this year. The phenomenon known as “bring-your-own-device,” which refers to employees bringing their own equipment into the corporate environment, was boosted by the launch of devices with friendlier interfaces....
Remember Sneakernet? Those of us who worked on IT security issues in the 90s probably haven’t heard that term in a while. For those too young to remember,
Editor’s Note: Welcome to our weekly Reality Check column. We’ve gathered a group of visionaries and veterans in the mobile industry to give their insights into the marketplace.
According to the Criminal Intelligence Service Canada, crimes facilitated through technology encompass a wide variety of offences that pose different...
To many users, password policies are as daunting and ridiculous as the tax code. Nobody enjoys having to remember or type complex and difficult passwords day after day. Even worse is having to change those passwords month-after-month for no reason.
“Mobile computing offers new challenges, but they are less about infrastructure and more about people. Mobile devices can carry a huge security risk,” said RSA executive chairman, Art Coviello, at the beginning of an interview with RCR Wireless News. “Behavior is going to be one of...
After launching its mobile device management (MDM) platform, called BlackBerry Mobile Fusion in the U.S., the Canadian Research in Motion (RIM) gathered journalists and clients in São Paulo to unveil the solution in Brazil. Mobile Fusion is a single interface that provides a unified view for managing...
With mobile phones set to become as indispensable as a wallet for buying goods and services, mobile payment developments are rapidly gathering pace and different service providers are competing for their slice of the pie.
A 2011 McAfee survey entitled “Mobility and Security: Dazzling Opportunities, Profound Challenges” found that 63% of mobile devices accessing corporate networks are also used for personal activities.
It is very difficult for companies to protect mobile devices for reasons such as technical issues (some devices will not install all the desired software); low battery capacity (when performing a lot of processes, the battery goes out) and because in many cases, the...
Editor’s Note: Welcome to our weekly Reality Check column. We’ve gathered a group of visionaries and veterans in the mobile industry to give their insights into the marketplace.
There is an intimate connection between people and their mobile device. It has been coined the "consumerization of IT" and...
LAS VEGAS - Like most large multi-nationals, Hewlett-Packard (NYSE: HPQ) can be challenged to orchestrate its different verticals, which ranges from business-focused products to end user-user focused personal devices. Distilling the range of objectives can even be complicated to digest, even for HP's employees –...
LAS VEGAS—After HP's turbulent year in 2011, with Léo Apotheker stepping down as CEO just 11 months after being named and the indecision over the future of its PC business, HP (NYSE: HPQ) used this week's HP Discover 2012 event to make its enterprise business strategies...
Two big IT events happened in Las Vegas last month: Interop and Symantec Vision. Both events made a very good impression on me when I downloaded the apps and found out I could do my check-in,
Within a couple of years, the exploitation of various infection techniques will make malware as problematic on mobile devices as it is on PCs – and because mobile operators are also subject to Windows-based
Increased mobility, cloud computing, and IT consumerization are the main enterprise trends that companies around the world are basing their strategies on. RCR Wireless News is watching these trends to learn how they are affecting companies and impacting chief information officers (CIOs).
Vendors, consulting firms,...
Increases in the sales of PCs, laptops, and especially smartphones are spurring growth in the security market. A report from Symantec Corp. shows that while the number of vulnerabilities decreased by 20% last year compared to 2010, the number of malicious attacks continued to...