Iris scanning, facial recognition, fingerprint sensing — which biometric keeps your data most protected?Continue readingWhich Biometric Authentication Method Is the Most Secure?
Samsung Secure Folder keeps your personal apps and data separate from work on your smartphone.Continue readingSecure Folder Puts Private Data Encryption in Your Hands
With ultrasonic fingerprint ID, the Samsung Galaxy S10 brings a new dimension of biometric security and convenience to the enterprise.Continue readingUltrasonic Unlock: The Innovation Behind Our In-Display Fingerprint ID
Mobile security solutions have shifted as dramatically as smartphones have throughout their 15-year history.Continue readingThe Evolution of Mobile Security Solutions
Android faced millions of new security threats in 2018. How do enterprises learn to adapt and prepare for what's next?Continue readingLessons From 2018: Handling the Next Mobile Security Breach
Enterprises should take shadow IT projects seriously — and build IT architectures that reduce risks of shadow IT security failure.Continue readingWhat Is Shadow IT and Who Can Stop It?
In this week's comic, learn how keeping work and personal life separate is really, really important!Continue readingKeep Work and Life Separate With Samsung Secure Folder
Global small businesses should be aware of mobile security risks when traveling. Here are some tips to improve your protections.Continue readingMobile Device Security Risks for the Global Small Businesses
Here are five things to look for in a cloud-based VPN service for roaming users on Wi-Fi and cellular networks.Continue readingWhat to Look for in a Cloud-Based VPN
Biometrics are burying passwords — but they're not perfect. Janice Kephart shares security awareness issues and coming solutions.Continue readingBiometric Security Awareness: Top Focus Areas for Business