CIO – 7 Enterprise Mobile Security Best Practices 3.1 3.1.18 3.1.19 Access Control
This article from CIO provides seven best practices to help companies secure their mobile envrionments.
This article from CIO provides seven best practices to help companies secure their mobile envrionments.
The NCCoE mobile device security efforts are dedicated to solving businesses most pressing mobile cybersecurity challenges.
This NIST Special Publication provides recommendations to facilitate more efficient and effective storage encryption solution design, implementation, and management for Federal departments and agencies.
This NIST Special Publication helps organizations centrally manage and secure mobile devices against a variety of threats.
This NIST Special Publication is one part in a series of documents intended to provide guidance to the Federal Government for using cryptography to protect its sensitive, but unclassified digitized information during transmission and while in storage.
In this course, you'll learn what mobile device management (MDM) is, and how it can be used to secure your environment and create a great user experience.
This SANS course will prepare you to effectively evaluate the security of iOS and Android mobile devices, assess and identify flaws in mobile applications, and conduct a mobile device penetration test, which are all critical skills required to protect and defend mobile device deployments. You will learn how to pen test the biggest attack surface in your organization; dive deep into evaluating mobile apps and operating systems and their associated infrastructure; and better defend your organization against the onslaught of mobile device attacks.
Some simple steps to keep you and your devices safe and secure.
This article provides companies with ideas on how to mitigate the risk that mobiles carry with them as attackers turn to target them.
This video from SANS educates viewers on the positive and negative aspects of using full disk encryption for security.