Bill Brenner
Understand mobile security in seven stories or less (a survival guide)
A collection of articles to help you understand the mobile threat and plan your security program accordingly
Your Android's dirty little secret
Experts at ShmooCon 2011 say Android gives third-party applications permissions that are easy to hijack
Business partners a growing security concern
Survey shows business and tech executives worry their own security is threatened because the security of business partners has been shaken by the recession
Security blunders 'dumber than dog snot' leave organizations vulnerable
A security assessor reveals the common blunders and idiotic things people who should know better do daily
Mobile phone security dos and don'ts
Here is a collection of tips from five experts on how to secure smartphones in the enterprise
The security-hole baton passes from Microsoft to Adobe
And Apple increasingly looks like the next major vendor whose products could give hackers a way to wreak havoc
Your BlackBerry's dirty security secrets
Though it's enterprise IT's favorite smartphone, the BlackBerry is more susceptible to spyware and other security risks than you might think
Cybersecurity efforts stalled as Obama eyes Afghanistan
Critics say a perfect storm is brewing and a 'Digital Pearl Harbor' grows more likely
Why the top U.S. cyber official is losing sleep
Melissa Hathaway tells RSA attendees: The nation's digital infrastructure is full of security holes that leave us vulnerable
Social networking dangers exposed
IT administrators dislike such apps as MySpace and Twitter, but cybercrooks depend on them, according to security experts
Debunking the Patch Tuesday hype machine
IT people in the business world have a standard patching procedure, making the need for alarmist Patch Tuesday announcements unnecessary