Showing Blog Posts: 1–10 of 24 tagged Mobile

  • Taking Stock: Ranking the Next Billion-Dollar CyberSecurity Markets

    by RSAC Contributor on October 14, 2015

    This post in our VC-series comes from Venky Ganesan, managing director and cybersecurity investor of Menlo Ventures. With IT security spending estimated to crest the $75 billion annual mark before the end of 2015, there’s no shortage of emerging security sectors that will soon cross $1 billion in annual revenues. At the same time, with so many startups pursuing cybersecurity solutions, venture…

  • RSA Conference Asia Pacific Japan Friday Preview

    by Fahmida Y. Rashid on July 24, 2015

    There are 28 sessions to choose from on the final day of RSA Conference Asia Pacific & Japan 2015. While the first day of sessions offered a lot of region-specific content, the second is more general. Instead of being region-specific, the sessions are more strategic, providing insights on specific topics. Mobile payments is a popular topic, but it is a concept with a lot of traction in Asia. Many…

  • Innovation Sandbox Contest Returns to RSA Conference APJ 2015

    by Fahmida Y. Rashid on July 21, 2015

    While the RSA Conference Asia-Pacific and Japan 2015 starts with the keynotes on Wednesday, July 22, there are plenty of events on Tuesday, including the CSA Summit and Innovation Sandbox. Innovation is a popular word, especially in security circles. Everyone thinks their approach to solving a security problem is the right way to fix the problems plaguing the industry. Who doesn’t want to stand out…

  • Future Crimes: Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It

    by Ben Rothke on March 30, 2015

    Technology is neutral and non-moral. It’s the implementers and users who define its use. In Future Crimes: Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It, author Marc Goodman spends nearly 400 pages describing the dark side of technology, and those who use it for nefarious purposes. He provides a fascinating overview of how every major technology can be used to benefit…

  • Guidelines for Mobile Computing Security

    by Robert Moskowitz on December 15, 2014

    Mobililty is clearly the future of computing. Smartphones and tablets are more powerful and bring-your-own device is an accepted reality. This raises major security issues, as mobile computing can be readily compromised at the device, network and wireless connectivity levels. The mobile device itself—whether a portable computer, personal digital assistant, laptop, smartphone, tablet computer, or…

  • The Bright Future of Mobile Payments

    by John Linkous on November 7, 2014

    Cashless payment for goods and services continues to evolve, and mobile payments are quickly becoming the battleground for new products and technologies that drive consumer and merchant convenience. Such payments ensure rapid payment for credit issuers and other constituents in the transaction chain. Some of these technologies are still evolving and represent truly revolutionary approaches, while…

  • News Pick: TUAW Explains Apple Pay

    by Fahmida Y. Rashid on October 8, 2014

    If you are at all interested in Apple Pay and how it works, make sure to check out the thorough writeup examining the security behind the technology by Yoni Heisler over at The Unofficial Apple Weblog. Heisler spoke with a few individuals involved with the development of Apple Pay to understand how the mobile payment technology works and to determine whether it's secure. One takeaway from the…

  • The Internet of Things: The Death of General Purpose Computing?

    by Gib Sorebo on September 29, 2014

    Ever try to send a text from your laptop while you’re on the go? Theoretically you could with the right hardware and software, but why would you? Laptops aren’t meant to be that mobile or that convenient. The text message, with its 140 character limit, was the quintessential application, and for a while the only one, for cell phones. Similarly, the thought of writing a ten page document on a…

  • Mobile Device Management and the Ubiquity of Mobile Authentication

    by John Linkous on September 2, 2014

    We all know that mobile devices are rapidly becoming an absolutely indispensable component of the online world. , This makes mobile device management even more critical, regardless of who is managing the device: a large enterprise, a small business, or just you. Online banking and other sites require a mobile device in order to send a one-time password to authenticate transactions. Smartphone…

  • No Easy Answer for In-App Data Security on Mobile Devices

    by John Linkous on August 7, 2014

    The proliferation of mobile devices—smartphones, tablets, convertibles, and more—is leading to a fundamental shift in how technology is used both for individuals and businesses. It's also leading to major problems for ensuring mobile security, especially inside of apps. App data is managed through Internet-connected, platform-specific programs for mobile devices, delivered through trusted app…

This document was retrieved from on Wed, 25 Nov 2015 19:53:45 -0500.
© 2015 EMC Corporation. All rights reserved.