Don’t forget to Encrypt your Windows Phone 7 Data
Whether you’re targeting Mobile Line of Business apps for the Enterprise or B2C apps for consumers, ensuring that sensitive data is encrypted is a must. These days, I can’t have a serious discussion...
View ArticleWhat the new App Hub in Windows Phone Mango means for the Enterprise
If you attended MIX 11 or watched it on Channel 9, you might have seen Todd Brix’s session titled “Making Money with your Applications on Windows Phone.” In this session, Todd talked about all the...
View ArticleEncrypting your Credentials on Windows Phone 7.5
The last time I talked to you about Windows Phone security, I showed you how to encrypt your data and save it in Isolated Storage using Silverlight’s AesManaged class to create a Key and an...
View Article5 Steps to Containerize your Enterprise Mobile Apps
Just in case you haven’t noticed lately, the BYOD Juggernaut appears to be stumbling in the security department. It’s time to get your mobile enterprise house in order and containerize your apps to...
View ArticleWindows Phone 8 is now FIPS 140-2 Certified
With FIPS 140-2 certification, Windows Phone 8 now meets the security requirements of the United States and Canadian governments meaning it’s secure enough to be used by federal agencies and the...
View ArticleWindows Phone 8.1 is Here
For users of the Nokia Lumia 1520 on AT&T, the Microsoft Windows Phone 8.1 mobile operating system update is available for immediate download. The smartphone built from the ground-up to address the...
View ArticleReduce Company Expenses and Enforce Mobile Security with Exchange Active Sync
If you don’t have an Enterprise Mobility Management solution, start with Exchange Active Sync to enforce device policies and security. Baby steps. While you might not say Microsoft Exchange Server in...
View ArticleReduce Business Risk by Enforcing Security Policies on Data with Digital...
To enforce data security policies directly, get an EMM solution with digital rights management to protect data where it flows & rests. So far, our EMM journey to secure corporate data has dealt...
View ArticleReduce Business Risk by Migrating your Legacy Software to Modern, Secure...
Businesses drag their feet when mobilizing line of business apps via legacy software migration thinking it’s cheaper to maintain a codebase than to rewrite. I get it. Migrating all those apps to mobile...
View ArticleDon’t forget to Encrypt your Windows Phone 7 Data
Whether you’re targeting Mobile Line of Business apps for the Enterprise or B2C apps for consumers, ensuring that sensitive data is encrypted is a must. These days, I can’t have a serious discussion...
View ArticleWhat the new App Hub in Windows Phone Mango means for the Enterprise
If you attended MIX 11 or watched it on Channel 9, you might have seen Todd Brix’s session titled “Making Money with your Applications on Windows Phone.” In this session, Todd talked about all the...
View ArticleMobile Apps Must be their own Fortress to Withstand Attacks from Hackers
A mobile app must be its own fortress and never assume platforms are encrypted, authenticated, use VPN or require a PIN for security. I guess developers can’t count on anything these days. How you deal...
View ArticleIoT Minute Episode 18: SDK Security and Identity
An Internet of Things software development kit should facilitate secure data transmission by passing along a unique identifier for the device, a secure access token or certificate and by creating an...
View ArticleDon’t forget to Encrypt your Windows Phone 7 Data
Whether you’re targeting Mobile Line of Business apps for the Enterprise or B2C apps for consumers, ensuring that sensitive data is encrypted is a must. These days, I can’t have a serious discussion...
View ArticleWhat the new App Hub in Windows Phone Mango means for the Enterprise
If you attended MIX 11 or watched it on Channel 9, you might have seen Todd Brix’s session titled “Making Money with your Applications on Windows Phone.” In this session, Todd talked about all the...
View ArticleSDK Security and Identity
n #IoT #software development kit should facilitate secure data transmission by passing along a unique identifier for the device, a secure access #token or #certificate and by creating an encrypted...
View ArticleEncrypting your Credentials on Windows Phone 7.5
The last time I talked to you about Windows Phone security, I showed you how to encrypt your data and save it in Isolated Storage using Silverlight’s AesManaged class to create a Key and an...
View Article5 Steps to Containerize your Enterprise Mobile Apps
Just in case you haven’t noticed lately, the BYOD Juggernaut appears to be stumbling in the security department. It’s time to get your mobile enterprise house in order and containerize your apps to...
View ArticleWindows Phone 8 is now FIPS 140-2 Certified
With FIPS 140-2 certification, Windows Phone 8 now meets the security requirements of the United States and Canadian governments meaning it’s secure enough to be used by federal agencies and the...
View ArticleWindows Phone 8.1 is Here
For users of the Nokia Lumia 1520 on AT&T, the Microsoft Windows Phone 8.1 mobile operating system update is available for immediate download. The smartphone built from the ground-up to address the...
View Article
More Pages to Explore .....