Menu

Blogs

Showing Blog Posts: 11–20 of 20 tagged Mobile

  • Enterprise IT Virtualization Makes Security a Harsh Reality

    by David Wallace on May 15, 2014

    Enterprise IT virtualization is a multi-syllable way of saying "software in the cloud," and companies are finding that its benefits are real—but so are its challenges. The same selling points that attract users—budget savings, the convenience of working from anywhere, and the elimination of software service updates and incompatibilities—also create headaches for IT help desks and CIOs. The…

  • Modern Challenges of Mobile Forensics

    by John Linkous on May 14, 2014

    As the world of technology continues to move toward mobile devices, these devices are becoming rich targets for malware, bad actors, and even government agencies seeking to increase the scope of their surveillance capability. Of course, there's a lot that an enterprise can do to secure their mobile devices properly. However, the reality of today's threat landscape is such that that organizations…

  • Secure Global Open Source Calling and Message Tools

    by David Wallace on March 25, 2014

    Risk versus reward? Open source versus packaged? Security or flexibility? All of these decisions matter deeply when considering personal safety for international travelers. Because today's cell phones send a signal beacon that identifies your location, network, and movement, companies are turning to more secure open source applications to protect phone conversations and hide the email trail in…

  • New Legislation Addresses Mobile App Privacy in California

    by Stephen Wu on February 27, 2014

    The healthcare field is beginning to hop onto the bandwagon of mobile computing. Mobile computing is spreading to healthcare in a number of ways. The first use case is in diagnostics, in which a doctor or nurse could use a device to monitor health metrics, such as vital signs (whether at hospital stays or simply during a routine check-up), glucose levels for diabetics, sleep data, caloric or…

  • Hacking Exposed Mobile: Security Secrets & Solutions

    by Ben Rothke on August 26, 2013

    Little did anyone know that when the first Hacking Exposed books came out over 15 years ago, that it would launch a set of sequels on topics from Windows, Linux, web development, to virtualization and cloud computing, and much more. It was a series that launched a generation of script kiddies, in addition to security experts. In 2013, the newest edition is Hacking Exposed Mobile Security Secrets …

  • Hacking Exposed Mobile Security Secrets and Solutions

    by Ben Rothke on August 5, 2013

    Little did anyone know that when the first Hacking Exposed book came out over 15 years ago, that it would launch a large set of sequels. In 2013, the newest version is Hacking Exposed Mobile Security Secrets & Solutions. When the first edition of Hacking Exposed was published, Windows was dominant. In 2013, Windows is a dying operating system and mobile is the new king. In the book, the authors…

  • Update on BYOD and Mobile Device Management Book

    by Stephen Wu on June 22, 2013

    Last month, I wrote about the Mobile Transformation, the consumerization of information technology, and managing mobile devices in the enterprise. I gave a sneak preview of my upcoming book on managing mobile devices in the enterprise. I just finished reviewing the page proofs for the book. Accordingly, the book is on track for the publisher, the American Bar Association Section of Science …

  • Ally's Picks - Kevin Mahaffey and Mobile Security

    by Ally Lorentson Dunn on June 17, 2013

    While driving to work recently I heard a familiar name come over the radio. The story from NPR was about theft of mobile devices and how prevalent it has become in recent years. They called on industry expert, and frequent RSA Conference speaker, Kevin Mahaffey for his thoughts. Kevin speaks to his company's (Lookout, Inc.) attempts to build a safe way to remotely disable mobile devices after…

  • Bring Your Own Device (BYOD) for Control Systems?

    by Gib Sorebo on June 6, 2013

    I just finished attending Interop Las Vegas where I gave a talk entitled “BYOD Security and Privacy.” In walking the show floor and attending a variety of sessions, there was little doubt that Bring Your Own Device (BYOD) is a hot topic that cybersecurity professionals are struggling to get their arms around. The challenge is further magnified by the fact that this trend is less one of technology…

  • Legal Issues in Managing Mobile Devices in the Enterprise

    by Stephen Wu on May 17, 2013

    This month, I completed a book on the legal issues involved with managing mobile devices in the enterprise. The publisher will be the American Bar Association Section of Science & Technology Law. I served as Chair of the Section from 2010 to 2011. I expect the Section to publish the book in time for the American Bar Association Annual Meeting in August in San Francisco. But the purpose of this…

This document was retrieved from http://www.rsaconference.com/blogs on Sun, 21 Dec 2014 12:59:27 -0500.
© 2014 EMC Corporation. All rights reserved.