dcsimg
 

More articles by Mark Komisky

Mobile Device Security IV: Today's Top Three Vulnerabilities

This article outlines the chief threats to smartphone and wireless devices, and the countermeasures individuals and enterprises can take to secure data transmission and protect important personal and corporate information.

Mobile Device Security III: Employee-Owned Device Risks

Worker-owned PDAs and smartphones, while perhaps beneficial to staff productivity, introduce un-secure wild cards into otherwise secure environs; leaving companies open to data theft, regulatory compliance headaches, and other possible breaches of security.

Mobile Device Security I: Threats Real, Time to Act Now

Because today’s handhelds perform many of the same functions as a notebook computer, they pose similar vulnerabilities to themselves and the enterprise. Bluefire CEO Mark Komisky highlights e-mail in this first of a series of articles on mobile security.