These are observations from the work we’re doing at MobileIron. Every day, we encounter lots of interesting and thought-provoking situations where just the introduction of mobile technology into an organization has created significant behavioral and technology shifts in the status quo. The world is changing. By the time my kids graduate from college and get their first jobs, they won’t use a desk phone or probably even a PC. If you believe, like us, that mobile will become the primary computing platform for the enterprise … and especially if you don’t … please comment and share your thoughts.
Thanks for reading!
A Scottish Worldview and iOS 8 App Extensions
Sandeep Jain | September 29, 2014
MobileIron Customer Deployments are Not Vulnerable to Bash Exploit
Michael T. Raggo | September 25, 2014
Recently a significant vulnerability in the Bash shell has been reported on various versions of Linux. See https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271 for details.
This vulnerability is not exploitable in MobileIron customer deployments. The exploit of this vulnerability requires untrusted user input to be used for the setting of environment variables in the Bash shell. In MobileIron...Continue Reading »
MobileIron Privacy Blog: The Security and Privacy Paradox
Sandeep Chopra | September 25, 2014
MobileIron Privacy Blog
This is the first in a series of blog posts about evolving privacy requirements for enterprise mobility. I will be sharing best practices from the industry and MobileIron customers, but this post should not be used as a substitute for competent legal advice from a licensed professional attorney...
Three Questions Enterprises Should Ask About iOS 8
Ojas Rege | September 17, 2014
PCI Security Standards Council North America 2014 Meetings Debrief
Michael T. Raggo | September 13, 2014
Just last week, I participated in the PCI Security Standards Council North America 2014 meetings. As a participating organization, MobileIron contributes to the Mobile Point-of-Sale (POS) requirements and guidelines for Payment Card Industry Data Security Standard (PCI DSS) and...Continue Reading »
BYOD Grows Up: California Ruling on Reimbursement
Ojas Rege | September 2, 2014
Approaches to Security Compliance for Real-Time Mobile Data Access
Michael T. Raggo | August 20, 2014
Securing the Internet of Things: Seven Questions to Get Started
Rahul Sharma | August 12, 2014
This is the first in a series of blog posts on security and management approaches for the Internet of Things (IoT).
Growth of IoT
IoT has been generating significant buzz recently. Gartner, Inc recently published: “...Continue Reading »
BlackHat Report: App Wrapping
Michael T. Raggo | August 7, 2014
I was happy to see that BlackHat 2014 had a strong focus on mobile enterprise security. At MobileIron, we have always been very supportive of the security research community and its efforts to improve the security of the mobile ecosystem, and so I want to highlight one of the presentations at the conference.
"Unwrapping the...Continue Reading »
News Reports on Potential iOS Backdoors
Ojas Rege | July 24, 2014