7 Mobile Security Bloggers To Follow

Bookmark these informative blogs

Add bookmark

With new enterprise mobile device security threats and vulnerabilities being discovered on a frequent basis, it helps to read analysis from numerous industry leaders.

IQPC's Enterprise Mobility Exchange compiled a list of some of the best IT bloggers with shrewd insights on mobile device security. All of them provide astute analysis on the biggest mobile device security challenges and how to mitigate risks. In no particular order, here are seven of those leading bloggers:

  1. Mark Bowker
    In addition to being one of the top contributors to Enterprise Mobility Exchange, Mark Bowker is a senior analyst at Enterprise Strategy Group (ESG). Bowker constantly demonstrates his deep understanding about the latest trends in mobility and security. On the ESG website, he blogs about industry news and the most pressing challenges that keep mobility leaders up at night. Bowker has written recent blogs about securing unified endpoint management (UEM) platforms, virtualization, mobile device management, and delivering a secure workspace. His blogs provide an outlook about the next major mobile and security hurdles that IT teams should prepare for. Follow Mark Bowker’s blog.

  2. Brian Krebs
    For over a decade, Brian Krebs served as a reporter for the Washington Post covering computer security topics. In recent years, Krebs has made a name for himself in security circles with his book, “Spam Nation: The Inside Story of Organized Cybercrime-from Global Epidemic to Your Front Door”. He regularly posts blogs on numerous security issues, especially with regards to mobile devices. Follow Brian Kreb’s blog.

  3. Rochester Institute of Technology Students
    If you have ever wondered about how the next generation of cyber security experts is thinking about mobility, then check out the blog from the students of the Rochester Institute of Technology (RIT). These students are currently enrolled in Fundamentals of Computer Security, an introductory course in information security concepts. In addition to the student contributors, instructor Ben Woelk uses the blog. Recent topics on the RIT student blog include vulnerabilities to mobile operating systems, securing Internet of Things (IoT) devices, and multi-factor authentication. Follow the RIT student blog.

  4. Pierluigi Paganini
    Gain a global perspective on security issues by reading Pierluigi Paganini’s blog entitled Security Affairs. A security analyst and evangelist by trade, Paganini is also a member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group, and a member of Cyber G7 Workgroup of the Italian Ministry of Foreign Affairs and International Cooperation. Paganini posts several blogs each day. His recent mobility topics surround fraudulent apps, Android ecosystem security, and the latest operating system updates. Follow Pierluigi Paganini’s blog.

  5. Mike Feibus
    Industry analyst Mike Feibus is the president of Feibus Tech, a leading online voice on numerous technology and security issues. He frequently contributes articles to numerous publications, and he includes a blog on his own website that lists all of his published articles. Although there are many topics that Feibus has covered, his articles on mobile and security are particularly interesting. He has written about everything from mobile data protection to the security vulnerabilities with passwords. Follow Mike Feibus’ blog.

  6. Graham Cluley
    Independent computer security analyst Graham Cluley has given numerous presentations around the world, but his most insightful analysis might be on his frequently updated blog. It is no easy task to stay up-to-date about the latest mobile security threats, but Cluley’s blog manages to have his finger on the pulse of the industry. His news and advice could be a valuable asset to securing your device. Recent mobile security topics covered by Cluley include jailbreaking an iPhone, unlocking an Android device with a 3D printed head, and malicious mobile apps. Follow Graham Cluley’s blog.

  7. Tom Olzak
    With over 38 years of experience in IT, Tom Olzak has seen it all. The independent security researcher has already written three books: “Just Enough Security,” “Microsoft Virtualization,” and “Enterprise Security: A Practitioner's Guide.” Today, Olzak publishes a blog about critical enterprise security issues, including about mobile devices. He has recently written article pertaining to managing vulnerabilities, training users, access control, continuous authentication, and effective policies. Follow Tom Olzak’s blog.

Article originally published by Steven Lerner, Editor, Enterprise Mobility Exchange


RECOMMENDED