An Internet of Things software development kit should facilitate secure data transmission by passing along a unique identifier for the device, a secure access token or certificate and by creating an encrypted tunnel via TLS.
A mobile app must be its own fortress and never assume platforms are encrypted, authenticated, use VPN or require a PIN for security.
Businesses drag their feet when mobilizing line of business apps via legacy software migration thinking it’s cheaper to maintain a codebase than to rewrite.
To enforce data security policies directly, get an EMM solution with digital rights management to protect data where it flows & rests.
If you don't have an Enterprise Mobility Management solution, start with Exchange Active Sync to enforce device policies and security.
For users of the Nokia Lumia 1520 on AT&T, the Microsoft Windows Phone 8.1 mobile operating system update is available for immediate download. The smartphone built from the ground-up to address the security and management needs of every enterprise has arrived. Some of you developers and early adopters running the developer preview may need to use the Nokia Software Recovery Tool to... Continue Reading →
With FIPS 140-2 certification, Windows Phone 8 now meets the security requirements of the United States and Canadian governments meaning it's secure enough to be used by federal agencies and the military. This also means Windows Phone 8 is more than secure enough to be trusted by companies and individuals all over the world. The National Institute... Continue Reading →
Just in case you haven't noticed lately, the BYOD Juggernaut appears to be stumbling in the security department. It's time to get your mobile enterprise house in order and containerize your apps to create islands of security on potentially insecure mobile devices. We've seen buggy mobile operating system updates that allow users to bypass lock screens,... Continue Reading →
The last time I talked to you about Windows Phone security, I showed you how to encrypt your data and save it in Isolated Storage using Silverlight’s AesManaged class to create a Key and an Initialization Vector (IV) based on a password and salt value. This gave your consumer and line-of-business apps the iron-clad AES... Continue Reading →