Agencies face a delicate balancing act when it comes to providing mobile security. On the one hand, IT departments seek to extend endpoint security to a growing population of mobile devices. It's easy ...
WASHINGTON — Hospitals nationwide have failed to implement an effective mobile device security policy, according to presenters at the mHealth Summit 2012. Despite the fact that hospitals are a major ...
In our last post, we discussed the current landscape of mobile device discovery, including how ubiquitous mobile devices are in our everyday lives and the trend that discovery of mobile devices has ...
Get the latest federal technology news delivered to your inbox. In the wrong hands, a government-issued mobile device poses a serious cybersecurity threat. Troublingly, a July 2023 report revealed ...
Understanding best practices for mobile device security in today’s healthcare environment can be challenge for many organizations. As mobile devices such as tablets and smartphones become more ...
A comprehensive mobile security policy is essential now that so many employees use tablets, smart phones, USB drives and other mobile devices and media to conduct business. But a policy doesn't do any ...
Rapid evolution of mobile technology has transformed how people live and conduct business In conversations with group of Chief Information Security Officers(CISO) recently in a CXO gathering, asked ...
Mobile devices are being used in the healthcare space in increasing numbers because the benefits of using mobile devices are many — the emergence of mobile applications allows physicians to easily ...
Welcome to the fourth installment of the MDM spotlight series. There is little doubt that smart mobile devices are a boon for individual productivity, but corporate IT groups are scrambling to ...
Asia’s digital environment—particularly China’s mobile-first business culture and evolving regulatory landscape—is necessitating global companies to rethink Bring Your Own Device (BYOD) programs.
The Department of Homeland Security (DHS) has submitted a report to Congress detailing current and emerging threats to the federal government’s use of mobile devices. The report recommended security ...
With the adoption of cloud computing and mobility skyrocketing, e-mail security and compliance player Proofpoint on Tuesday put its security into the public cloud and onto mobile devices with the ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results