Virtualization was the “it” trend of 2010, much like bring-your-own-device (BYOD) is the dominant trend right now. Looking back at 2010, the inhibitors of virtual desktop infrastructure are remarkably similar to the concerns around BYOD.
BlackBerry (BBRY) just can't catch a break. It's long-awaited Z10 smartphone is finally hitting the market, just as Samsung, now the world's leading maker of mobile devices, readies its own enterprise solutions.
"Checks indicate Samsung is preparing an aggressive push into the enterprise segment and...
Android malware encounters grew 2,577% during 2012, according to Cisco's 2013 Annual Security Report. Malware, software designed to damage a system or to steal money or information, is tracked by Cisco when the networking giant detects or blocks an attack. Most attacks fall into...
The domain name system (DNS) was created 30 years ago to make the Internet simpler to use and more controllable. It has evolved to ensure greater network performance, working against malware attacks. Now, DNS is being used by telecom providers to provide security and...
The tide of business mobility continues to rise as more companies realize the productivity benefits available from an always-connected workforce, and as users realize the flexibility corporate-connected
As we gaze at the crystal ball – or rather the crystal cloud – for the mobile industry in 2013, we see some significant technologies and trends that have the potential to transform
If your organization has valuable data, assume someone is going to come after it in 2013 through mass market attacks that provide cover for targeted attacks.
There is an untapped big data gap. Only .5 % of data is currently analyzed by companies to help them make decisions. IDC's latest Digital Universe Study sponsored by EMC showed that in 2012, 23% of the information in the digital universe (or 643 exabytes) would...
Mobile device management, mobile app management (MAM), container-based apps, mobile virtualization, mobile backend as a service (MbaaS), network access control (NAC) and software-defined networking (SDN) are some of the various approaches that companies are using to manage fast-paced mobility adoption, according to a new...
Mobile applications undermine conventional online controls against fraud but open up several much stronger controls – although they are dependent on a deep understanding of mobile and fraud.
Malicious mobile apps, government-sponsored attacks and sandbox avoidance are among seven major cybersecurity threats predicted by Websense Security Labs for 2013. The company recently released its 2013 threat landscape and noted that cybercriminals gained confidence and momentum in 2012.
According to Websense Security Labs vice president,...
Earlier this year, the CEO of IBM's Brazilian unit said that more time is needed to understand the impact of mobile devices on corporate business, but that hasn't stopped IBM from acting. The company recently announced new software and service additions to its mobile enterprise suite.
This...
The prevalence of “iDevices,”the bring-your-own-devices (BYOD) trend and the shift from Blackberry to Apple and Google devices are among the major challenges to mobile security today. “BYOD has changed it fundamentally,” said John McCormack, global president of Websense.
McCormack talked with RCR Wireless News during this...
Among the many buzzwords in the IT world, BYOD was one of the most talked about this year. The phenomenon known as “bring-your-own-device,” which refers to employees bringing their own equipment into the corporate environment, was boosted by the launch of devices with friendlier interfaces....
Remember Sneakernet? Those of us who worked on IT security issues in the 90s probably haven’t heard that term in a while. For those too young to remember,
Editor’s Note: Welcome to our weekly Reality Check column. We’ve gathered a group of visionaries and veterans in the mobile industry to give their insights into the marketplace.
According to the Criminal Intelligence Service Canada, crimes facilitated through technology encompass a wide variety of offences that pose different...
To many users, password policies are as daunting and ridiculous as the tax code. Nobody enjoys having to remember or type complex and difficult passwords day after day. Even worse is having to change those passwords month-after-month for no reason.
“Mobile computing offers new challenges, but they are less about infrastructure and more about people. Mobile devices can carry a huge security risk,” said RSA executive chairman, Art Coviello, at the beginning of an interview with RCR Wireless News. “Behavior is going to be one of...
After launching its mobile device management (MDM) platform, called BlackBerry Mobile Fusion in the U.S., the Canadian Research in Motion (RIM) gathered journalists and clients in São Paulo to unveil the solution in Brazil. Mobile Fusion is a single interface that provides a unified view for managing...
With mobile phones set to become as indispensable as a wallet for buying goods and services, mobile payment developments are rapidly gathering pace and different service providers are competing for their slice of the pie.
A 2011 McAfee survey entitled “Mobility and Security: Dazzling Opportunities, Profound Challenges” found that 63% of mobile devices accessing corporate networks are also used for personal activities.
It is very difficult for companies to protect mobile devices for reasons such as technical issues (some devices will not install all the desired software); low battery capacity (when performing a lot of processes, the battery goes out) and because in many cases, the...
Editor’s Note: Welcome to our weekly Reality Check column. We’ve gathered a group of visionaries and veterans in the mobile industry to give their insights into the marketplace.
There is an intimate connection between people and their mobile device. It has been coined the "consumerization of IT" and...