How Device Certificates Secure our Mobile Identities
A quick look at our world today reveals that the need for mobile security has never been greater. After all, the number of activated mobile devices has actually surpassed the population of our planet. For the people who use them — which is just about everybody — such devices permeate every aspect of life. These [Read More...]
Playing in the Digital Sandbox: Mobile versus Desktop Security
Mobile operating systems consume resources from unknown sources on the Internet all the time, and yet they are not infected in the same manner as desktop operating systems. Certainly, sideloaded malicious Android apps are able to access parts of a mobile device that the user has authorized (e.g., pictures, contacts, SMS). We have also seen [Read More...]
Top 10 Holiday Scams to Steer Clear of this Season – Part 2
This is Part 2 of a two-part series. To read the first post, click here. Top 10 Holiday Scams to Steer Clear of this Season 6. Order shipment notification When doing your holiday shopping, always make sure that the email notification confirming your order shipment is directly tied to the official company of which you [Read More...]
Top 10 Holiday Scams to Steer Clear of this Season – Part 1
Top 10 Holiday Scams to Steer Clear of this Season You have spent all night looking for the perfect gift online for your spouse, children or significant other. After hours of searching, you finally come across the ultimate package certain to grant you a lifetime pass to the Nice List — two tickets to the [Read More...]
A Glance at Mobile Security: The Trusted Execution Environment
As the global workforce continues to mobilize, many processes that were once typically run from applications based on an internal server are now conducted with remote devices. IT executives, therefore, must count on such devices to provide adequate protection against any malicious activity that might interfere with critical business processes. When it comes to mobile [Read More...]
Is Your Mobile Device Secure?
Infographic Visualizes Truth on Mobile Security Our world is becoming faster and more portable every day. I can picture an 80-year-old version of myself mindlessly rambling about a time where you could only send 200 text messages a month, but only if your parents trusted you enough to upgrade your service plan. Meanwhile, my grandkids [Read More...]
What Do You Want from Mobile?
Building on an already robust suite of mobile solutions , Entrust just announced version 2.0 of our Mobile Smart Credential. This new release includes a few very cool features that help organizations deploy stronger, more effective security controls and improve the end-user experience. This makes security that is simple rather than a frustrating barrier that gets in the way of business.
Mobile and Security – No Longer Mutually Exclusive
In December, Entrust and Forrester began work on a Technology Adoption Profile (TAP) whitepaper centering on mobile. As organizations have begun to accept the inevitable — the eventuality of mobile devices permeating networks and infrastructures — they are looking to address mobile security as a whole and not as siloed device types (e.g., corporate- and employee-owned). With this in mind, the report discusses bring-your-own-device (BYOD) and corporate-owned devices together.
Entrust at RSA: Secure Mobile, Leverage Mobile
During RSA Conference 2013 at Booth 1139 this week, Entrust authentication experts Mike Moir and Mike Byrnes are showing how organizations are able to deploy a two-pronged approach to not only secure mobile identities and transactions, but also leverage mobile devices to secure the online channel.
Layered Security USING your Mobile Device
A natural extension to my last post, I find it interesting that most people intuitively see the need to secure mobile devices, applications and transactions, but they are likely unaware of the incredible power and convenience mobile devices present in terms of serving as a security device themselves. Increasingly, mobile devices are used for more [Read More...]