Protecting your personal information and privacy on a company phone
How private is a smartphone when you use it for work? Technology, policy and laws protect you — but only if you're well informed.
Get the latest insights from Samsung delivered right to your inbox.
Follow Us
Get the latest insights from Samsung delivered right to your inbox.
Joel Snyder, Ph.D., is a senior IT consultant with 30 years of practice. An internationally recognized expert in the areas of security, messaging and networks, Snyder is a popular speaker and author and is known for his unbiased and comprehensive tests of security and networking products. His clients include major organizations on six continents.
How private is a smartphone when you use it for work? Technology, policy and laws protect you — but only if you're well informed.
Now licensed at no charge to all customers, KPE includes Knox for ML tools that developers can use to secure their ML models.
Small businesses may not have the resources for a full security team, but they still need to protect their data and assets.
Businesses can stand out by greeting visitors with user-friendly tablet kiosks through device customization with Knox Configure.
A comprehensive guide and template for developing a successful BYOD policy tailored to your organization.
Learn how to identify and mitigate risks associated with sensitive patient data on mobile technology.
Loading apps from untrusted and unverified app stores introduces risks that IT managers should avoid.
Allowlisting and blocklisting are similar approaches to app security with different results. Here are some pros and cons of each.
You've got your mobile security basics covered. Here are three advanced tips to keep phone hackers out of your data.
Passwords are easy to steal; faking biometrics is difficult. And unlike passwords, biometrics don't travel outside of your device.