Why Smartphones Have the Best Security for Blockchain and Cryptocurrency
Thanks to isolated TEEs, smartphones may be the most reliable blockchain technology available for cryptocurrency storage.
Get the latest insights from Samsung delivered right to your inbox.
Follow Us
Get the latest insights from Samsung delivered right to your inbox.
Joel Snyder, Ph.D., is a senior IT consultant with 30 years of practice. An internationally recognized expert in the areas of security, messaging and networks, Snyder is a popular speaker and author and is known for his unbiased and comprehensive tests of security and networking products. His clients include major organizations on six continents.
Thanks to isolated TEEs, smartphones may be the most reliable blockchain technology available for cryptocurrency storage.
Confused by the many moving parts involved in Android security patches and updates? Here's how it works behind the scenes.
Developing a BYOD policy is a complex task. If you are about to put pen to paper, make sure you avoid these common mistakes.
Mobile security training is on everyone's radar. Here are four tips to help your employees avoid a security breach.
Healthcare sees frequent breaches, there are some healthcare IT security best practices that can help.
Small businesses can improve IT security with these few simple steps — even without a dedicated IT department.
Hardware-based security give an extra layer of smartphone protection. Here's what to look for.
Ensure your company's mobile policy is prepared for GDPR compliance by focusing on these four areas of risk.
Biometrics in the enterprise require a variety of options to best suit multiple security and hardware needs.
A few small tweaks to MDM can help ensure mobile devices don't pose a problem with GDPR compliance.