Search

Search results

  1. Good News, Bad News for Federal Mobile Security

    ... good and bad news about the security of the government’s mobile device environment. "Threats to the mobile device ecosystem are ... program in mobile application security to enable the secure use of mobile applications for government use. Establish a new ...

  2. SIGNAL Coverage: West 2017

    ... 5 non-negotiable principles to combat cyber war on mobile The U.S. government is unprepared for cyberwar on mobile. Read a ... has gone from zero to 100. The number of people using their phones at work is increasing the ‘quality’ of the data on mobile devices, ...

  3. When Air Gapping Fails: How to Protect Data

    ... Others can wirelessly extract sensitive data through nearby mobile phones. Perhaps most alarming is USB-born malware, specifically the new ... without interruption. Provide technology  such as secure KVMs (keyboards, video and mice) and fiber extenders that let users, ...

  4. Readily Accessible Encryption Tools Proliferate

    ... for example, can be obtained from several sources, including mobile phones, for the delivery of end-to-end encryption. Capabilities can ... also are available from Cryptocat, Folder Lock, Secure IT, Kruptos 2, CryptoForge, SafeHouse, SensiGuard and Privacy Drive. ...

  5. For DoD, the Road to the Cloud Is Paved With Promise and Pitfalls

    ... people already use and expect with the new crop of popular mobile devices like Android smart phones and Apple iPads. During the second ... Security Command (INSCOM) said her agency is deploying a "secure sandbox" in which younger warfighters comfortable with developing ...

  6. Federal Agency Keys In to Secure Mobile Phones

    ... From circuit-switched networks (CSN), to Global System for Mobile Communications (GSM), to Enhanced Data Rates for GSM Evolution (EDGE), technology has reached the point where it is now feasible to secure mobile communications. Only recent mobile devices-witness the iPhone-can ...

  7. Security Smarts for the New Breed of Mobile Phones

    ... the personal computer than the telephone. Tom Cross, a mobile security expert with IBM Internet Security Systems X-Force , is ... organizational distributors of smartphones to take steps to secure their information and networks. He offers five recommendations for any ...

  8. Cell Phones on the Front Lines

    ... in places with less-than-ideal infrastructure and need secure channels, delivering these Swiss Army knives of communications gadgets ... requires three components: a handset, equipment that acts as mobile cell towers and a platform to take these cell towers literally to great ...

  9. Attestation and Inception: Deciphering Secure Reality from a Dream

    ... attestation? Turns out, one of the greatest challenges for mobile apps running on mobile end points is attestation. In the context of secure mobility, the goal of attestation is to prove to a third party—an app ...

  10. 'Delete' Seems to be the Hardest Word

    ... and L-3 announced the now infamous (in government circles) Secure Mobile Environment Portable Electronic Device (SME-PED) designed to be a ...

Pages