Filter By:

Recent Blogs & Podcasts

Insights

\ Mobility 



July 21, 2017 | Mobile Access and Device Management
By Ken Van Wyk, IANS Faculty

 Van Wyk: Security Track Record for iPhone Not an Accident

It’s not just luck. Apple has managed to keep the iPhone (and its iOS brethren) safe from any major malware outbreak for 10 years. Building a multi-faceted security architecture that substantially raises the cost of successful attacks can be extremely effective. 

Read More »


May 26, 2017 | Mobile Client Devices
By Aaron Turner, IANS Faculty

 Cellular Vulnerabilities: How to Fix These Hidden Risks

When it comes to the risks posed by cellular networks, enterprise security professionals don't know what they don't know. In this report, IANS Faculty Aaron Turner details the most pressing vulnerabilities and threats associated with cellular networks and offers some strategic steps security teams can take to help mitigate these threats and limit risk exposure. 

Read More »


March 28, 2017 | Mobile Access and Device Management
By Aaron Turner, IANS Faculty

 Geo-blocking Certain Mobile Device Functionality

Since high-capability mobile devices were first introduced, enterprises have wanted to deploy controls to limit the use of certain functions on these devices in sensitive locations. In this Ask-an-Expert written response, IANS Faculty Aaron Turner details the two major components of a comprehensive smartphone security control system and describes the process for implementing them. 

Read More »


March 22, 2017 | Mobile Access and Device Management
By Aaron Turner, IANS Faculty

 Enterprise Mobility: Defining a Security Strategy

Enterprises today are on their third generation of mobile technologies, and each iteration has had its own unique challenges. In this Ask-an-Expert written response, IANS Faculty Aaron Turner details some of the highest-impact risks organizations face in the mobility space today and offers some maturity-specific approaches companies can take to combat these risks. 

Read More »


March 6, 2017 | Threat Intelligence and Modeling
By Chris Poulin, IANS Faculty

 Poulin: Breaking Down RSA and the Past, Present and Future of Information Security

Whether you look forward to or dread the RSA conference each year, it's practically a must-attend event for everyone who’s anyone in information security. And after a week of confusing my fitness wearable by clocking more than 15,000 steps per day, I’m left with the impression that we’re making progress in information security.

Read More »


January 25, 2017 | Mobile Access and Device Management
By Aaron Turner, IANS Faculty

 Preventing Phishing on Mobile Devices

Phishing attacks happen on every platform, but few anti-phishing tools are available for mobile. In this Ask-an-Expert live interaction, IANS Faculty Aaron Turner suggests some network-based controls that can help reduce the risk and underscores the need for mobile-focused user awareness training.

Read More »