Mobile devices are the new network perimeter: Can they be secured?

Mobile devices are great for productivity, but they have completely changed the vulnerability state of our networks. Learn what we have to fear and what measures we can take to solve the mobile edge security problem in this download.

Also check out these other downloads on mobile edge security:

Investigate the first PC-to-Windows-handheld, cross-infector malware

We've seen blended Trojan and virus threats that can spread through smartphones using multiple wireless protocols. Now analyze the first malware that simultaneously infects both PCs and Windows Mobile handheld devices.

Learn how the iPod will change the face of computer security

By making DRM technology socially acceptable, the iPod has paved the way for the integration and acceptance of the Trusted Computing Group's architecture, which will allow completely new uses and applications of computer security

Secure your wireless PDA connection with this step-by-step guide

Whenever a Pocket PC owner uses a public hotspot to check e-mail or surf the Internet, he or she is vulnerable to sniffer-based attacks. Review this step-by-step guide to securely communicating with almost any online service.