Mobile

Mobile | News, how-tos, features, reviews, and videos

government cios without authority washington columns executives
Apple Lockdown Mode

Exium expands SASE, 5G-based security for midsize enterprise networks

The on-premises module offers new capabilities, based on 5G standards, for midsize businesses.

CSO slideshow - Insider Security Breaches - Flag of China, binary code

Canada bans Huawei, ZTE in 5G networks

Ottawa government’s move follows similar bans in other English-speaking countries, citing potential security risks to 5G communications networks.

mobile security / threat detection / traffic analysis

How to hack a phone: 7 common attack methods explained

Mobile security often beats PCs, but users can still be fooled and smartphones can still be hacked. Here’s what you need to watch for.

mobile security

8 mobile security threats you should take seriously

Mobile malware? Other mobile security threats are more pressing. Every enterprise should have its eye on these eight issues.

A router sits on a table amid abstract digital connections as a man works from a sofa in background.

8 things your security team needs to know about WPA3

All new Wi-Fi devices must now be WPA3-certified, and this has implications for how you manage the security for wireless connections in both the office and for home-based employees.

mobile security

Mobile security failings putting enterprises at risk

A typical mobile security breach in a large organization can cost millions of dollars. Mobile Security can be a daunting task with many potential pitfalls to protect against. Knowing the key security exposure mechanisms can help you...

iot security startups hot planets rocket lock security

15 hot tech skills getting hotter -- no certification required

Employers are apt to invest more often in cash premiums for noncertified tech skills compared to certifications. Here are a few they’re coveting the most now and going forward.

5G light trails

Domestic 5G development at core of US communications security plan

New NTIA document outlines White House 5G security goals, which promote home-grown R&D and call for continuous risk assessment and management.

A man using a mobile phone in shadow against a bright wall

Amid the pandemic, using trust to fight shadow IT

With most workers scattered at home and trying to come up with their own ad-hoc IT workarounds, there’s an easy way for IT shops to build trust: communicate.

meeting6

Telecommuting in a post-COVID U.S. will be radically different. And that's a very good thing.

IT execs need to start talking with other C-levels now and figure out what they want their post-COVID company to look like.

COVID-19 coronavirus [morphology/visualization]

3 ways COVID-19 is changing CISO priorities

The scramble to enable remote workers changes security strategies, priorities, and workflows for 2020.

tt20 015 thumb
video

MWC cancellation: What does it mean for the future of tech trade shows?

One of the largest tech trade shows, Mobile World Congress, canceled its convention just a few weeks before it was scheduled to begin. GSMA, the organization that puts on MWC, decided to cancel after a number of high profile vendors...

crystal globe with binary code

Is technology killing globalization?

What you need to know -- and do -- about the tech-driven deglobalization trend and how it’s effecting change. Your career depends on understanding how nationalism and regulations impact business.

tt20 010 thumb
video

The problem with mobile and app voting

It's the day after the 2020 Iowa caucuses, and the Iowa Democratic Party has yet to announce the winner. The app that precinct leaders were supposed to use to report final tallies recorded inconsistent results. Party leaders blamed a...

youtube thumbnails template
video

Android in 2020: Trends and predictions

Foldables, 5G, new Android phone options – watch as Computerworld blogger (and Android expert) JR Raphael joins IDG TECH(talk) hosts Ken Mingis and Juliet Beauchamp to discuss what we can expect for Android phones in 2020.

mobile security / threat detection / traffic analysis

Inspecting TLS-encrypted traffic with mitmproxy

The free, open-source mitmproxy tool makes it easy to inspect TLS-encrypted app and web traffic to see exactly who your phone is talking to.

youtube thumbnails template
video

What we can expect from Apple in 2020

2019 was a big year for Apple, with the arrival of the Apple Card, the iPhone 11, the new Mac Pro and and a new MacBook Pro. What can we expect from the company in 2020? Macworld’s Michael Simon and Computerworld’s Ken Mingis offer...

CSO slideshow - Insider Security Breaches - Spam email identified

Will spam die in 2020?

The problem with spam isn't that it's a time-wasting annoyance, but that it drives us away from phone calls and emails to bad media.

Load More
You Might Also Like