You searched for android | SC Media

Your search for android returned 16 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Mobile Security remove
Feature remove

Your search for android returned 16 results

Sort Results:

Relevant Recent
Internet of Things
Features

Can one CISO ever beat an army of IoT devices?

The security threat from the Internet of Things (IoT) has grown real because far too many of those sneaky IoT devices fly in under the radar. Corporate maintenance, facilities and operations departments are not accustomed to requesting IT's signoff on purchasing light bulbs or door locks. And yet, when those devices have their own independent - or dependent - communications capabilities, they are an easy backdoor for cyberthieves.
Features

Integrate mobile

Even the best security people can't be expected to know the whole zoo of devices being used across a large organization, reports James Hale.
Safe tether: Wearables
Features

Safe tether: Wearables

Wearable devices efficiently monitor user activity, but also open new targets for malware authors, reports Alan Earls.
Beyond BYOD
Features

Beyond BYOD

The ever-increasing use of personal devices has tested enterprise defenses, so plans must be created to meet the challenge, reports James Hale.
The high-tech hydra: BYOD
Features

The high-tech hydra: BYOD

No a business' size, employees are yearning to connect their personal devices to the corporate network. But fear not: Solutions and best practices are starting to emerge to manage the risk attached with this craze.
Is danger looming: Mobile vulnerabilities
Features

Is danger looming: Mobile vulnerabilities

With users flocking toward mobile platforms, fraudsters will join as well. But businesses have a bigger problem: What to do about employees wanting to use their devices to connect to the corporate network.
Next post in Features