Mobile security
3:00
Oct 24, 2017

Missing puzzle piece in mobile security

Companies should develop mobile device policies to define what mobile devices are permitted to access on the network, says Michael Morton, a mobile security specialist at Securicom.

4:10
Feb 25, 2016

Closing the mobile security gap

The best hope for enhanced mobile security lies in building security into the application development life cycle, says Godfrey Kutumela, head of the Security Division at IndigoCube.

3:00
Nov 10, 2015

Comprehensive strategy needed for true mobile security

Letting employees bring various devices into the company and connecting these to the network creates many vulnerabilities, says?Sean Glansbeek, MD at Seven Days Technologies.

12:40
Nov 10, 2015

BYOD and beyond

The right mobile security strategy requires that everyone in the organisation knows the risks.

4:00

Mobile security vital in 2014

The increasing number of attacks on mobile devices correlates with the growing number of Internet-connected devices in the marketplace, says Richard Broeke, a consultant at Securicom.

5:50

Bring your own mobile security

The co-mingling of personal and work applications and data increases the risk of corporate data loss and malware breaches, says Brad Pulford, enterprise solutions group director at Dell.

5:20
Apr 22, 2013

Business Connexion talks mobile security

Organisations should embrace the mobile revolution in a sensible way, says Eric McGee, managing executive, Information Security Services at Business Connexion.

2:40
Oct 18, 2011

Mobile insecurity

Mobile security software will become as typical as Internet security products for PCs and laptops, says Simon Campbell-Young, CEO of Phoenix Software.

4:50
May 26, 2011

Smart but deadly

As smartphones infiltrate the workplace, so do hackers, information thieves and even the odd spy.

5:30

Mobile workforce must beware of risks

A user attempting access to a network cannot always be trusted to be the person s/he claims to be, says Martin Tassev, MD of Loophold Security Distribution.

2:40
Apr 20, 2009

Mobility needs privacy

Investing in advanced data protection software is critical in managing notebooks, says Tasia Iconomou, HP notebook product manager at Axiz.

3:40
Jan 30, 2009

Mobility becomes entrenched

With the rise of wireless and mobile technologies and devices have come the security challenges, says Pierre Holtzhausen, channel manager at Nology.

Related topics