Mobile

alienvault

AT&T Cybersecurity Insights... Report: Security at the Speed of 5G

While some enterprises appear to be getting an early jump on the security implications of 5G, many are struggling with the implications to the business and the changing security model. This is based on a survey AT&T Cybersecurity conducted with 451 Research of 704 cybersecurity professionals in North America, India, Australia and UK in August - September 2019. Participating organizations spanned 13 industry verticals and each had more than 500 employees.

victorops

Tips for Mobile Mindfulness While On-Call

People are expecting streamlined mobile experiences for nearly anything and everything. Everyone’s searching for mobile solutions to all of their daily responsibilities – from social media to productivity and business-oriented apps. According to an article from Perficient Digital, 58% of all website visits in 2018 came from mobile devices. On-call scheduling, alerting and incident response for DevOps and IT is no different.

bugfender

Bugfender compatibility with SwiftUI and Project Catalyst

When Apple introduced SwiftUI back in July we immediately knew it was going to generate a lot of expectations. As app developers ourselves, we are very aware about the complexity of User Interface development in iOS. UI has been keeping apps especially expensive and error prone along the years. Many frameworks were created to improve this situation like ComponentKit, Texture or even React Native.

bugfender

Bugfender Growth: from side-project to a sustainable $20k MRR business

It’s nearly five years since we started Bugfender as an offshoot of our software company Mobile Jazz. We’d gotten tired of chasing users who were experiencing problems with our apps and wanted to build an internal remote logging tool that would feed the information straight to us. It really was a garage project back then. We were running code sprints on our own time, so we wouldn’t have to dig into our savings. But we soon realized this could be much more than an internal experiment.

manageengine

12 mobile device features that help ensure corporate data security

Our hearts might skip a beat every time we put our hands in our pocket and can’t find our mobile phone, and we’re filled with dread at the thought of losing the device that contains our personal photos and the corporate data saved on it. But just misplacing a device is not how we put corporate data at risk; small actions in our day-to-day lives can have a major impact on the safety of the corporate data on our devices.

manageengine

Introducing the Wi-Fi Analyzer for OpManager's Android app: A perfect team for sustained IT infrastructure management

Addressing Wi-Fi issues can be challenging Tracking the availability, speed, and performance of a large number of systems, servers, VMs, routers, access points, firewalls, interfaces, and WAN links, plus monitoring their health is not a simple task. Tackling angry emails from employees about Wi-Fi running slowly, or it taking a lifetime to download a simple setup file or load a business-critical application, can hamper productivity.

manageengine

More Android malware and another iOS exploit: How to safeguard your devices?

The past few months have seen both Android and iOS fall prey to various security attacks, with more malware attacks and exploits being uncovered on a daily basis. First, let’s look at the newest zero-day Android vulnerability. This vulnerability leverages the ”use-after-free” memory flaw to wreak havoc on mobile devices. In layperson terms, the use-after-free flaw allows access to memory recently freed (after performing some operation) to execute malicious code.

manageengine

Android malware: How do enterprises tackle this ever-growing menace?

Let us first agree on a couple of things before we start: One, Android is the most affordable platform for enterprises with a mobile-first/mobile-only workforce, and it has the smallest learning curve of any mobile OS. Two, due to its very open-source nature, Android is easy for malicious actors to pray on, with the Google Play Store being the breeding ground for many attacks.

bitrise

Mobile DevOps Strategy: 4 Pillars

In many cases, the way a team approaches the processes surrounding mobile development will look very much like whatever the first person that joined put in place: it's notoriously difficult to iterate on mobile development processes. There are definite benefits to taking a step back, reviewing and putting together a mobile DevOps strategy, though. In this article, I'll list some of the basic pillars of a mobile DevOps Strategy.