Security News
![The New Rules of Customer Service: Why You Need Mobile, Social, Cloud (IT Toolbox Blogs)](/static/build/img/news/alt/application-stats-small.jpg)
![Mobile Gambling Apps Expose Enterprise Data: Report (SecurityWeek)](/static/build/img/news/alt/Data-Cybersecurity-Predictions-small.jpg)
![T-Mobile CEO declares war on thieves who are stealing tethered LTE data (Yahoo Security)](/static/build/img/news/alt/application-stats-small.jpg)
![How Do Mobile Experts Use Mobility and What Does it Mean for Retailers? (IT Toolbox Blogs)](/static/build/img/news/alt/Data-Cybersecurity-Predictions-small.jpg)
![Choosing the Right Mobile Tools for CRM in the Field (IT Toolbox Blogs)](/static/build/img/news/alt/Data-Cybersecurity-Predictions-small.jpg)
![Mobile device screens recorded using the Certifi-gate vulnerability (The Register)](/static/build/img/news/alt/application-stats-small.jpg)
![Security flaws exposed in Dolphin, Mercury mobile browsers (ZDNet)](/static/build/img/news/alt/application-stats-small.jpg)
![Mobile Commerce Strategies - Contextually Relevant Opportunities, Moments and Environments (IT Toolbox Blogs)](/static/build/img/news/alt/application-stats-small.jpg)
![Risky mobile behaviors are prevalent in the government (Help Net Security)](/static/build/img/news/alt/cybersecurity-attacker-small.jpg)
2015-08-24 07:00
Mobile devices are extremely prevalent in federal agencies, even within those that purport to have policies prohibiting the use of them. Lookout analyzed 20 federal agencies and found 14,622 Lookout-e...
![#8: Implement Mobile Application Management (MAM) Approaches (IT Toolbox Blogs)](/static/build/img/news/alt/application-stats-small.jpg)
Mobile devices are extremely prevalent in federal agencies, even within those that purport to have policies prohibiting the use of them. Lookout analyzed 20 federal agencies and found 14,622 Lookout-e...