2014-06-11


Welcome to the Mobile Cyber Security News Weekly, our newest online newsletter. Mobile Cyber Security will focus on the most interesting news, articles and links related to mobile and cyber security, mobile malware, mobile application management, cyber warfare (and more!) that I run across each week.  I am specifically targeting market trend information.

Also read Connected Globe News Weekly
Also read Field Mobility News Weekly
Also read Mobile Commerce News Weekly
Also read Mobile Health News Weekly
Also read Mobility News Weekly

Looking for an enterprise mobility solution?  Read the Mobile Solution Directory Here!

With use of smartphones and tablets on the rise and sales of traditional PCs on the decline, attacks on mobile devices are maturing, says IT research and advisory firm Gartner Inc. Read Original Content

Apple has announced that it will be giving mobile app designers an additional option for mobile security by opening up its fingerprint ID feature that will enable them to toughen up the protection level by another layer. Read Original Content

Beefing up its security efforts, Finnish telecom equipment maker Nokia will launch a dedicated security unit that will act as its central office for security processes, partnerships and guide for developing product. Read Original Content

The True Cost of Mobility - Companies are under tremendous pressure to develop and deploy mobile apps for their business systems, yet the traditional approach to mobile app development typically costs $250K+ and takes 6+ months for a single app. Today IT professionals are exploring platforms that radically reduce costs and time-to-market for their mobile initiatives, especially around complex applications such as SAP, Oracle, or custom applications. Download the whitepaper - https://www.capriza.com/resources/whitepapers/?resource=true-cost-of-enterprise-mobility&adgroup=MES

The mobile advertising libraries developers use to track behavior patterns and generate revenue are a potentially serious threat to the security of smartphone and tablet-equipped businesses, according to a report released by Mojave Networks. Read Original Content

The mobile security risk created by the use of tablets and smartphones in businesses as a result of the use of third party apps has experienced a “monumental increase” according to the results of a recently published report. Read Original Content


Visiongain has determined the value of the global mobile security market in 2013 will reach $3.49 billion. Read Original Content

The iPhone 6 could be Apple’s most secure smartphone to date thanks to iOS 8’s new privacy upgrades. The new OS has two features in particular that show Apple has responded to this new wave of enthusiasm for smartphone security. Read Original Content

MarketsandMarkets expects the global smartphone security market to grow from $387.15 million in 2010 to $2964.89 million by 2016. The global smartphone security market for Android OS is the fastest growing one with a CAGR of 65.05 percent from 2011 to 2016 due to increasing number of applications. Read Original Content

Cyber crime costs the global economy about $445 billion every year, with the damage to business from the theft of intellectual property exceeding the $160 billion loss to individuals from hacking, according to research published on Monday. Read Original Content

China will begin checking computer systems used in government departments to protect "sensitive data". The state Internet information office announced the measures amidst rows of cyber spying between China and the United States. Read Original Content

Latest Articles on http://mobileenterprisestrategies.blogspot.com

IoT Expert Interview: Microsoft's Nick Landry
Kevin Benedict Interviews SAP's Consumer Insight 365 Guru Jim Brooks
Mobile Expert Interview: SAP's Adam Stein
Mobile Expert Interview: VDC's Eric Klein
Mobile Expert Interview: SAP's Senthil Krishnapillai
Mobile IoT Expert Interview: Dr. Severin Kezeu

Webinars of Note (Recorded)

Rapidly extend any enterprise application to mobile devices without coding, APIs, or integration.
Virtualization ≠ Mobilization

Whitepapers of Note

A Comparison of the StarMobile MORPH Protocol vs. Traditional Remote Computing Protocols
Don't Get SMACked - How Social, Mobile, Analytics and Cloud are Reshaping the Enterprise
Making BYOD Work for Your Organization
Managing BYOD and Legacy Systems
The Secret to Enterprise Mobile Application Adoption
Solving The Mobile Developer Scarcity Problem
StarMobile Transforms Enterprise Apps into Mobile Apps
The True Cost of Mobility

************************************************************************

Kevin Benedict

Writer, Speaker, Editor

Senior Analyst, Digital Transformation, EBA, Center for the Future of Work Cognizant

View my profile on LinkedIn

Learn about mobile strategies at MobileEnterpriseStrategies.com

Follow me on Twitter @krbenedict

Browse the Mobile Solution Directory

Join the Linkedin Group Strategic Enterprise Mobility

Join the Google+ Community Mobile Enterprise Strategies

Recommended Strategy Book Code Halos

Recommended iPad App Code Halos for iPads

***Full Disclosure: These are my personal opinions. No company is silly enough to claim them. I am a mobility and digital transformation analyst, consultant and writer. I work with and have worked with many of the companies mentioned in my articles.

Kevin Benedict,
Senior Analyst, Digital Transformation, Cognizant
Follow me on Twitter @krbenedict

Show more