Wednesday, December 03, 2014

Mobile Cyber Security News Weekly – Week of November 30, 2014

Welcome to the Mobile Cyber Security News Weekly, our newest online newsletter. Mobile Cyber Security will focus on the most interesting news, articles and links related to mobile and cyber security, mobile malware, mobile application management, cyber warfare (and more!) that I run across each week.  I am specifically targeting market trend information.

Also read Connected Globe News Weekly
Also read Field Mobility News Weekly
Also read Mobile Commerce News Weekly
Also read Mobile Health News Weekly
Also read Mobility News Weekly

Looking for an enterprise mobility solution?  Read the Mobile Solution Directory Here!

The worldwide mobile device security client software market is expected to hit US $4.1 billion in 2018, reflecting a five percent compound annual growth rate of 25 percent, according to Infonetics. In the second quarter, global mobile device security software revenue grew 10 percent sequentially to US $466 million. Read Original Content

BlackBerry Ltd. is partnering with rival smartphone maker Samsung Electronics Co. in an agreement that will see it provide mobile security technology for the Android operating system. Read Original Content

More than 40 percent of UK businesses have suffered a security breach from work mobile phones in the past 12 months, according to BT, which has warned companies are not taking the dangers of smartphones seriously enough. Read Original Content

B2M Solutions’ mobile software delivers valuable insight and actionable analytics for enterprise customers. Business leaders and managers within the mission critical, rugged mobile enterprise now have operational views of key business and technology analytics affecting performance and productivity. B2M software is developed with specific functionality to help organizations identify and unblock mobility problems as soon as, or even before, they occur, allowing customers to sustain critical business processes and gain competitive advantages. To Lean more visit  This newsletter is sponsored in part by B2M Solutions

According to IDC Health Insights, by 2015, half of healthcare organizations will have experienced one to five cyber attacks in the previous 12 months, with a third of those attacks successful. Read Original Content

The Australian government is refreshing its cyber security strategy to better preempt attacks on its networks, in the face of increased attacks on its infrastructure, the Prime Minister’s Office announced. The government’s intelligence agency reported a 37 percent increase in cyber attacks involving government agencies in 2013, compared to 2012. Read Original Content

Mobile security research firm Lookout revealed findings on Thursday showing hackers can now effectively turn Android phones into so-called botnets, a compromised device that can be used to communicate with other infected devices for nefarious purposes. Read Original Content

Increased adoption of BYOD policies has spurred demand for better security solutions and initiated growth in the Global BYOD Security Market, according to a new report from research firm TechNavio. The global market is expected to post a compound annual growth rate of 35.23 percent from 2015-2019. Read Original Content

According to SNS Research, this year will be a banner one for mobile device and network security investments, as companies are expected to spend $11 billion to protect their smartphones and tablets from malware. Read Original Content

Latest Articles on

Amplified Influence and Mobile Apps
Feeling Thankful - Is there an App for That?
Gamification Strategies and Mobile Applications - The Way it Should Be
2015 Enterprise Mobility Events Announced
Insights into the Impact of Big Data, Mobile Apps and Code Halos Strategies on Retail
Transforming Web Content for Enterprise Mobility
Mobile Expert Interviews: Snappii's CEO Alex Bakman
Mobile Expert Interviews: Red Hat's Mike Piech
Big Data Business Models and Code Halo Strategies with SmartStory's CEO Michael Boerner

Webinars of Note (recorded)

Virtualization ≠ Mobilization

Whitepapers of Note

A Comparison of the StarMobile MORPH Protocol vs. Traditional Remote Computing Protocols

Don't Get SMACked - How Social, Mobile, Analytics and Cloud are Reshaping the Enterprise
Making BYOD Work for Your Organization

Kevin Benedict
Writer, Speaker, Senior Analyst
Digital Transformation, EBA, Center for the Future of Work Cognizant
View my profile on LinkedIn
Learn about mobile strategies at
Follow me on Twitter @krbenedict
Subscribe to Kevin'sYouTube Channel
Join the Linkedin Group Strategic Enterprise Mobility
Join the Google+ Community Mobile Enterprise Strategies
Recommended Strategy Book Code Halos
Recommended iPad App Code Halos for iPads

***Full Disclosure: These are my personal opinions. No company is silly enough to claim them. I am a mobility and digital transformation analyst, consultant and writer. I work with and have worked with many of the companies mentioned in my articles.