Mobile and wireless security

You may need to do a quick third-party registration to access certain ones. Resources without a hyperlink are no longer published/posted.

Articles
  • What the end of hot patching mobile apps means for enterprise security
  • Headed for a wreck? Why you need to be paying attention to data security for connected cars
  • Take responsibility for vendor product security
  • IoT at RSA: A New Focus on Old Problems
  • Steering your career as a desktop admin in the mobility age
  • New Windows 8.1 features can boost mobile device management
  • Don’t ignore mobile security effects on enterprise desktop management
  • IT needs to keep up with workers who use desktop cloud backup
  • Enterprises can’t afford a half-baked mobile security strategy
  • Windows Phone 8 security should be part of any mobile device strategy
  • What are the hidden mobile app security threats to look out for?
  • Understanding why Windows 8 for mobile is perfectly viable for enterprise use
  • Looking at Windows 8 BitLocker full-disk encryption and alternatives
  • Mobile app software: Avoid the perpetual cycle of insecurity
  • Mobile security services: Protecting against mobile security risks
  • Top 10 reasons we have our heads in the sand over mobile security
  • As BYOD, cloud change networking, VPN management still indispensible
  • Mobile security and how you can no longer ignore its impact on enterprise desktop management
  • Desktop backup oversights that can get you into a bind
  • BitLocker’s improvements leave gaps to be aware of
  • It’s time we shift our thinking about endpoint protection
  • Act now to prevent smartphone security risks at your organization
  • Compliance officers’ next big headache: Securing mobile applications
  • Lax enterprise mobile device management hampers e-discovery
  • Security tools that can boost Windows Mobile and Windows Phone 7 security
  • Whole disk encryption gotchas to look out for
  • Security considerations for Windows Phone 7
  • Securing the new desktop: enterprise mobile devices
  • Can mobile device security include risk management and compliance?
  • Enterprise iPads: Compliance risk or productivity tool?
  • Using BitLocker in Windows 7
  • Encryption – the great security control that nobody’s using
  • Securing SMB laptops
  • Securing removable media with BitLocker To Go
  • Run encryption the right way to ensure wireless network security
  • Mobile Security – Is anyone listening?
  • Security tools that can boost Windows Mobile security
  • Free security testing tools for Windows handheld devices
  • Windows Mobile OS security: Get it locked down
  • Mobile security: Setting responsible goals
  • Mobile security: Top oversights
  • Locking down laptops that connect to hotspots
  • What you need to know about laptop encryption
  • Wireless insecurities aren’t going away – but that’s OK
  • Five Simple Steps for Securing Your Wireless LAN on a Shoestring Budget
  • Do you really need a VPN for secure wireless LAN communications?
Whitepapers
  • Heading in the Wrong Direction with Data Protection? (Credant/Dell)
Podcasts
  • Mobile data protection options for enterprise CIOs
  • Data Protection for the Mobile Workforce
  • Top Five Issues of Mobile Security
  • Storage encryption FAQ
Webcasts
  • Leveraging rugged systems to meet the needs of your mobile computing environment
    Rugged notebooks have improved tremendously over the past few years. Companies in a wide variety of industries are using these extremely durable computers to meet their business needs. In this webcast discussion, I talk about the latest trends and features in using rugged systems for your mobile workforce
  • Data Protection for the Mobile Workforce
    Mobility is a business necessity for most organizations, with more laptops being deployed than desktops around the world. While users expect flexibility and the ability to take their data with them wherever they go, IT, Network and Security Managers need to make sure that data is protected and end user productivity is not significantly impacted in the case of a lost or stolen laptop. Attend this webcast to learn about costly mobile security mistakes that have been made within organizations. In addition, discover common pain points you can avoid, including data loss and system unavailability. Lastly, gain a better understanding of practical solutions that work and will help you achieve seamless mobile security within your organization.
  • Securing the Mobile Enterprise: Lock Down Your Wireless Data and Devices
    Despite the great potential for increased productivity that wireless networks and devices present, they also create new security risks. This webcast I co-presented with Chris Waters (CTO of Network Chemistry) details how to protect your mobile systems, critical assets, and confidential data from wireless misuse and attacks.

Client Testimonials

“A business associate referred our company to Principle Logic when we were seeking a resource to perform vulnerability /penetration testing for our external and internal networks. We found Kevin Beaver to be professional, well informed, and easy to work with. His testing did not disrupt our networks, and his progress updates were timely.

His final report was very thorough and included security recommendations for our network environment. The executive leadership was so impressed with Kevin’s security expertise, they have extended their agreement to continue to perform periodic testing. We highly recommend Kevin Beaver and Principle Logic as a resource for network security testing.”

(IT managed services firm)

 

I’ve written/co-written 12 books on information security including: