Blog Category: Mobile App Security



What’s Your Shadow IT Situation?

Shadow IT is looming. While most organizations likely realize that they have a problem with shadow IT–apps, devices and the like used without company knowledge or approval–chances are, they’re underestimating just how pervasive shadow IT is. In a new...

Are You Ready for GDPR?

Are you ready for GDPR? The General Data Protection Regulation, or GDPR, is set to go into effect one week from today on May 25, 2018. It’s been making headlines around the tech community, including here on our blog, where we’ve discussed both what the...

GDPR and App47: An Update

On May 25—just three weeks from today—the data privacy landscape will change radically.  Three Fridays from now, the grace period for the General Data Protection Regulation (GDPR), passed in April 2016 by European Parliament, will expire, and the hope is that...

Should You Embrace Shadow IT?

Few phrases in the enterprise are as polarizing as “shadow IT.” Shadow IT, which refers to the use by employees of apps or devices that are not sanctioned by the company, is widely debated. Some security professionals view shadow IT as an unavoidable reality; others...

The Enterprise Mobility Security Problem

There’s a security problem in enterprise mobility. Don’t believe us? Just ask other organizations trying to address security. According to a global survey of 900 IT decision makers by Gemalto, 95% of IT departments are battling with security challenges in their...

4 Choices for Secure Smartphones

Security is one of the most overlooked aspects in a typical smartphone user’s list of features, when it really should be the first. Luckily, there are plenty of options for businesspeople who use their smartphones to increase productivity in the workplace that...