We are pleased to present the findings of The State of Mobile Application Insecurity sponsored by IBM. The purpose of this research is to understand how companies are reducing the risk of unsecured mobile apps in the workplace.
Ponemon Institute is dedicated to independent research and education that advances responsible information and privacy management practices within business and government. Our mission is to conduct high quality, empirical studies on critical issues affecting the management and security of sensitive information about people and organizations.
Security from design through deployment.
Mobile devices are now a reality in many organizations. Building on Mobile Device Management (MDM) and Mobile Application Management (MAM), organizations are increasingly developing their own enterprise apps for specific job tasks to improve productivity, business partnerships, customer satisfaction and bottom-line performance. However, to achieve these benefits, it is imperative that mobile security best practices are incorporated throughout the lifecycle of the application.
Learn how to protect corporate data when users use personal devices for work.
The rapid proliferation of mobile devices entering the workplace appears to be like divine intervention to many IT leaders. Mobile devices and their apps have transformed the way we live – how we communicate, travel, shop, work and so much more. This mobility transformation has been so radical, so revolutionary, that it is hard to imagine life without these devices. Bring Your Own Device (BYOD) was born and employees followed with fervor.
Published By: Lookout
Published Date: Aug 28, 2017
The world has changed. Yesterday everyone had a managed PC for work and all enterprise data was behind a firewall. Today, mobile devices are the control panel for our personal and professional lives. This change has contributed to the single largest technology-driven lifestyle change of the last 10 years.
As productivity tools, mobile devices now access significantly more data than in years past. This has made mobile the new frontier for a wide spectrum of risk that includes cyber attacks, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. A secure digital business ecosystem demands technologies that enable organizations to continuously monitor for threats and provide enterprise-wide visibility into threat intelligence.
Published By: Lookout
Published Date: Aug 28, 2017
Mobile devices have rapidly become ground zero for a wide spectrum of risk that includes malicious targeted attacks on devices
and network connections, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating
systems or apps.
Read the four mobile security insights CISOs must know to prepare for a strategic conversation with the CEO and board about
reducing mobile risks and the business value associated with fast remediation of mobile security incidents.
Technology has had a truly transformative impact on the healthcare space. Thanks to innovations in technology, tools and their respective processes, the practice of treating patients has shifted from mostly reactive to proactive, enabling physicians and caregivers to approach healthcare in a more holistic fashion.
As part of that shift, hospitals, wellness centers and physicians’ offices are focusing on providing value over volume1, taking healthcare beyond the four walls of the facility and into patients’ homes, places of work and social centers. The concept of whole health is much easier to attain with technology such as artificial intelligence, analytics, wearables and mobile health (mHealth) apps, to name a few.
Published By: Progress
Published Date: Mar 26, 2018
The transition to value-based outcomes, an aging population, and new mobile and
wearable and chat bot technologies are driving changes across every aspect of the
Advances in digital health technologies hold great promise that healthcare can be
delivered in smarter, simpler, and more cost effective ways. Mobile technologies
can foster patient engagement, enhance care team communication, reduce cost
of delivery, and improve the healthcare experience for both patients and their
The key is figuring out which apps to tackle first. This document outlines a few of
the key use cases that are showing positive impact. While this isn’t an exhaustive
list, it provides several great places to start on the digital health innovation journey.
It’s no secret the restaurant industry is highly populated by teenagers. So what are the best tactics to engage your generation z employees while keeping your restaurant compliant with today’s labor laws? Research has found generation z to be very different than their older millennial brothers and sisters, meaning operators need to find a whole new approach to engage them.
In this guide we’ll highlight the engagement and compliance challenges restaurants face with this group of workers. And then we’ll walk you through best practices we’ve seen work using mobile scheduling apps and digital communication tools.
Published By: Insight
Published Date: Nov 16, 2017
With the mobile worker population on track to exceed 105 million by 2020, organizations in all industries are in a critical race to accommodate a new breed of worker. Comprised of millennials and Gen Xers alike, this new workforce expects seamless work experiences from device to desktop to laptop, anywhere, anytime. They demand to be fully equipped with the apps they need to do their best work — all without a hitch in the back-end systems and security that power and support them.
These are interesting and challenging times to be in business. Digital forces, such as the cloud, big data, mobility, and mobile apps, are disrupting tried-and-true business models, as well as entire industries.
These transformational advances are producing complexity, while workers are demanding simplicity. They require centralized infrastructures to keep information safe, even as agility and flexibility rule the day.