For some time now, many security experts have argued that rather than focus efforts on locking down endpoints, the focus needs to be on keeping the data itself secure. Just last week, we covered a number of the findings from the Human Behavior and Security Culture workshop, held by the Tuck School ...
Posts Tagged: mobile device
The Army will launch its mobile application store, the Army Marketplace, as soon as mid-November, according to Michael McCarthy, operations director of the Army Brigade Modernization Command’s Mission Command Complex. The Army is leading the way for the Department of Defense’s evolving s...
The Veteran Affairs Department, once a BlackBerry-only agency, is still on track to authorize new mobile devices to connect to the network beginning Oct. 1, but currently has no procurement strategy to acquire them. “I’m now in the mode of, ‘Yes, we have authorized the turn on. But no,...
via DoD BUZZ If you are like millions of government and private-sector workers, you hate your work computer. You hate Microsoft Outlook. You hate your official-issue mobile device — most likely a staid ol’ BlackBerry. So you set up your own processes to work with the hardware and softwar...
via Defense Systems Defense security experts have traditionally differentiated data protection strategies based on whether the information is at rest or in motion. But in today’s highly mobile world, many people have trouble distinguishing between the two modes. For example, is the data really...
via Bloomberg Research in Motion Ltd. (RIMM)’s PlayBook tablet computer, panned at its April debut, has an edge over Apple Inc. (AAPL)‘s iPad in the Army thanks to RIM’s encrypted servers. That advantage may soon dissipate as Apple’s more broadly popular devices march toward ...
via Defense Systems Security concerns come with the territory for owners of a smart phone, tablet or other mobile device. Yet few people are more focused on mobile security than defense community personnel, who fully understand that missing or compromised data could lead to lost lives, not just lost...
via Digital ID News When the National Strategy for Trusted Identities in Cyberspace was released in April some described it was “Woodstock for identity geeks.” Industry officials were excited to see the plan and hear what was announced, but there weren’t a lot of surprises. The goa...