5 mobile security lessons from the Department of Defense - email@example.com
|26th of Sep, 2012 by Admin |
|5 mobile security lessons from the Department of Defense|
|From: Computerworld Security Issues and Trends <firstname.lastname@example.org>|
|Computerworld Security: Issues and Trends: September 26, 2012|
5 mobile security lessons from the Department of Defense
Several years ago, the National Security Administration wasted millions on a
circuit-switched approach to mobile security strategy. With help from the
Department of Defense, the NSA is doing things differently now. Enterprise CIOs
can learn a few things from the effort, too.
~~~~~~~~~~~~~~~~~~~RESOURCE COMPLIMENTS OF: Symantec~~~~~~~~~~~~~~~~~~~~~
FREE TRIAL: Protect Your Endpoints
Get the fastest, most powerful endpoint antivirus software solution you can buy.
Symantec Endpoint Protection, powered by Insight, is fast, powerful security for
your endpoints and offers advanced defense against all types of attacks for both
physical and virtual systems
IN THIS ISSUE
1. INSIDER: Federated identity management still faces logistic hurdles
2. Cyber espionage campaign targets energy companies
3. Shark Tank: Just like the instructions said
4. Kenneth van Wyk: Shutting down security gotchas in iOS 6
5. Indonesia advances world's most ambitious biometric-based national ID project
6. European online counter-terrorism group considering widespread surveillance
7. Permanent cybersecurity team established for EU institutions
8. Intel hopes McAfee security features will differentiate mobile chips
~~~~~~~~~~~~~~~~~~~RESOURCE COMPLIMENTS OF: Drobo~~~~~~~~~~~~~~~~~~~~~
Drobo SAN for Business Live Demo Daily!
We want you to learn from the very bestDrobo expertsavailable every day.
Participate in live interactive sessions to see a live demo of Drobo products,
ask questions, validate deployment ideas. Our experts cover configuration,
sizing, network best practices, and infrastructure monitoringand talk VMware,
Hyper-V, iSCSI, Tiering, SSD acceleration.
INSIDER: Federated identity management still faces logistic hurdles
Years after it was hailed as the next big thing, federated identity management
hasn't been widely adopted because both sides don't benefit equally and
liability remains a concern. (Insider - free registration
Cyber espionage campaign targets energy companies
Hackers using a Remote Access Trojan (RAT) named Mirage have been engaged in a
systematic cyber espionage campaign against a Canadian energy company, a large
oil firm in the Philippines and several other entities since at least this
April, Dell's SecureWorks Counter Threat Unit says.
Shark Tank: Just like the instructions said
Employee who works in a remote office has his company iPhone replaced at the
local store for the mobile carrier, then calls this IT pilot fish at HQ with a
problem: The new phone won't accept his password.
Kenneth van Wyk: Shutting down security gotchas in iOS 6
What to do if you have data on your iPhone or other iOS device that you want to
~~~~~~~~~~~~~~~~~~~RESOURCE COMPLIMENTS OF: Hortonworks~~~~~~~~~~~~~~~~~~~~~
Live Webinar Series: The Future of Apache Hadoop
Hadoop has evolved rapidly to become the leading platform for managing,
processing and analyzing big data. Join us in this 4-part series with the core
committers of the Apache Hadoop projects to gain insight into Pig, Ambari,
Zookeeper and YARN. Learn use-cases and best practices on how to get started
with Hadoop and live Q&A.
Indonesia advances world's most ambitious biometric-based national ID project
Indonesia, a country composed of more than 70, 000 islands and that has
electricity infrastructure issues and limited bandwidth, is rolling out the
world's most ambitious biometrics-based national identity card project for its
European online counter-terrorism group considering widespread surveillance
A leaked document from a project set up by the European Commission to fight
terrorism online reveals suggestions for wide-ranging surveillance.
Permanent cybersecurity team established for EU institutions
European institutions beefed up their cybersecurity by establishing a permanent
Computer Emergency Response Team.
Intel hopes McAfee security features will differentiate mobile chips
Intel hopes security features from McAfee will help the company differentiate
its mobile chips from its rivals', according to Intel software chief Renee
Bad bosses, useless users, clueless consultants, lyrical limericks -- it's all
in a day's tank for Sharky. Join him and his pilot fish for a daily dose of IT
from the trenches.
Submit your true IT tale to email@example.com and if Sharky takes a bite,
he'll send you a sharp Shark shirt!
CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL
Users of Apple's new Maps app in iOS6 are encountering inaccurate maps,
off-kilter points-of-interest, missing streets and addresses and more. Is the
iOS 6 Maps controversy a black eye for Apple?
COMPUTERWORLD'S IT SALARY SURVEY 2012
A majority of IT workers say they're under pressure to increase productivity and
take on new tasks. But the vast majority are still happy they picked IT as their
NEW COMPUTERWORLD JOB BOARD
Search multiple listings now and get new job alerts as they are posted.
Get more IT peer perspective online:
LinkedIn Group: http://cwonline.computerworld.com/t/8245296/869152238/311619/0/
You are currently subscribed to computerworld_security_issues as: firstname.lastname@example.org.
To unsubscribe from this newsletter, go to:
To manage your subscription preferences, go to:
To subscribe to a newsletter, go to:
If you are interested in advertising in this newsletter, please contact: email@example.com
To contact Computerworld, please send an e-mail to firstname.lastname@example.org.
Copyright (C) 2011 Computerworld, 492 Old Connecticut Path, Framingham MA 01701
** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to email@example.com **
Track this Report
0 Comment | Post a comment
Post your Comment
Save thousands of potential victims.
Report spam or phishing email now!
Recently Updated Spam Reports
webnode.fr, 184.108.40.206, malicious content, viruses, malwaredomainlist, blacklist, mass spam, guestbook scrapshop exquisite 12-15%off buy women dresses at Mother's DayNEW BRANCH OF HILTON HOTEL OFFER JOB VACANT POSTS. Move over GoToMeeting, get BetterWebinars for half the cost!KINDLY ASSIST.forumkostenlos.com, sizzlinghotkostenlos.forumkostenlos.com, 220.127.116.11, hostgator spam domain tracking by Botnet IPcomefaresoldi.webstarts.com, 18.104.22.168, tracking of goodwork guestbook spam hammer by Botnet IP九江工业企业发票gl&udisystematic spam from Italy - business.telecomitalia.it - www.tin.it - www.libero.it - www.wind.it - www.fastweb.it - www.aruba.it - Pool Milano - www.Re: Worldwide Project Funding, BG/SBLC Lease.
Random Spam Reports
西昌学院毕业证样本图片订制_tKj新疆工程学院毕业证学位证样本定制__qC办/北京林业大学毕业证_oBb吉首大学张家界学院英语成绩报告单样本定制_SVZFwd: Good day, Your Package have Arrived USA Today Successful!! Urgent/Urgent.方城县办医师资格证___NFROM ERNEST WILLIAMS办湖北医药学院毕业证的微信？app.15808_pUPImportant DocumentChildrenYOUR CO-OPERATION AND ASSISTANCE IN THIS TRANSACTIONFrom Nary Mesah宁陕做会计从业资格证_Vab黑龙江兵器工业职工大学英语成绩报告单制作_AHQ办理安徽水利水电职业技术学院毕业【原版】学历证_GoBYOU HAVE WON US$2,950,000.00 /RESPONSE IMMEDIATELYurgent reply needed Hi Dear做北京汇佳职业学院毕业证_`XY哈尔滨远东理工学院英语四六级样本定制_oNY