
YouTube – NIST 800-171 Control 3.1.18 - Control connection of mobile devices.This article provides companies with ideas on how to mitigate the risk that mobiles carry with them as attackers turn to target them. The Missing Report – Phone Security: 20 Ways to Secure Your Mobile Phone.Some simple steps to keep you and your devices safe and secure. You will learn how to pen test the biggest attack surface in your organization dive deep into evaluating mobile apps and operating systems and their associated infrastructure and better defend your organization against the onslaught of mobile device attacks. This SANS course will prepare you to effectively evaluate the security of iOS and Android mobile devices, assess and identify flaws in mobile applications, and conduct a mobile device penetration test, which are all critical skills required to protect and defend mobile device deployments. SANS – SEC575: iOS and Android Application Security Analysis and Penetration Testing.

In this course, you'll learn what mobile device management (MDM) is, and how it can be used to secure your environment and create a great user experience.

This article from CIO provides seven best practices to help companies secure their mobile envrionments.
