5 mobile security lessons from the Department of Defense - email@example.com
|26th of Sep, 2012 by Admin |
|5 mobile security lessons from the Department of Defense|
|From: Computerworld Security Issues and Trends <firstname.lastname@example.org>|
|Computerworld Security: Issues and Trends: September 26, 2012|
5 mobile security lessons from the Department of Defense
Several years ago, the National Security Administration wasted millions on a
circuit-switched approach to mobile security strategy. With help from the
Department of Defense, the NSA is doing things differently now. Enterprise CIOs
can learn a few things from the effort, too.
~~~~~~~~~~~~~~~~~~~RESOURCE COMPLIMENTS OF: Symantec~~~~~~~~~~~~~~~~~~~~~
FREE TRIAL: Protect Your Endpoints
Get the fastest, most powerful endpoint antivirus software solution you can buy.
Symantec Endpoint Protection, powered by Insight, is fast, powerful security for
your endpoints and offers advanced defense against all types of attacks for both
physical and virtual systems
IN THIS ISSUE
1. INSIDER: Federated identity management still faces logistic hurdles
2. Cyber espionage campaign targets energy companies
3. Shark Tank: Just like the instructions said
4. Kenneth van Wyk: Shutting down security gotchas in iOS 6
5. Indonesia advances world's most ambitious biometric-based national ID project
6. European online counter-terrorism group considering widespread surveillance
7. Permanent cybersecurity team established for EU institutions
8. Intel hopes McAfee security features will differentiate mobile chips
~~~~~~~~~~~~~~~~~~~RESOURCE COMPLIMENTS OF: Drobo~~~~~~~~~~~~~~~~~~~~~
Drobo SAN for Business Live Demo Daily!
We want you to learn from the very bestDrobo expertsavailable every day.
Participate in live interactive sessions to see a live demo of Drobo products,
ask questions, validate deployment ideas. Our experts cover configuration,
sizing, network best practices, and infrastructure monitoringand talk VMware,
Hyper-V, iSCSI, Tiering, SSD acceleration.
INSIDER: Federated identity management still faces logistic hurdles
Years after it was hailed as the next big thing, federated identity management
hasn't been widely adopted because both sides don't benefit equally and
liability remains a concern. (Insider - free registration
Cyber espionage campaign targets energy companies
Hackers using a Remote Access Trojan (RAT) named Mirage have been engaged in a
systematic cyber espionage campaign against a Canadian energy company, a large
oil firm in the Philippines and several other entities since at least this
April, Dell's SecureWorks Counter Threat Unit says.
Shark Tank: Just like the instructions said
Employee who works in a remote office has his company iPhone replaced at the
local store for the mobile carrier, then calls this IT pilot fish at HQ with a
problem: The new phone won't accept his password.
Kenneth van Wyk: Shutting down security gotchas in iOS 6
What to do if you have data on your iPhone or other iOS device that you want to
~~~~~~~~~~~~~~~~~~~RESOURCE COMPLIMENTS OF: Hortonworks~~~~~~~~~~~~~~~~~~~~~
Live Webinar Series: The Future of Apache Hadoop
Hadoop has evolved rapidly to become the leading platform for managing,
processing and analyzing big data. Join us in this 4-part series with the core
committers of the Apache Hadoop projects to gain insight into Pig, Ambari,
Zookeeper and YARN. Learn use-cases and best practices on how to get started
with Hadoop and live Q&A.
Indonesia advances world's most ambitious biometric-based national ID project
Indonesia, a country composed of more than 70, 000 islands and that has
electricity infrastructure issues and limited bandwidth, is rolling out the
world's most ambitious biometrics-based national identity card project for its
European online counter-terrorism group considering widespread surveillance
A leaked document from a project set up by the European Commission to fight
terrorism online reveals suggestions for wide-ranging surveillance.
Permanent cybersecurity team established for EU institutions
European institutions beefed up their cybersecurity by establishing a permanent
Computer Emergency Response Team.
Intel hopes McAfee security features will differentiate mobile chips
Intel hopes security features from McAfee will help the company differentiate
its mobile chips from its rivals', according to Intel software chief Renee
Bad bosses, useless users, clueless consultants, lyrical limericks -- it's all
in a day's tank for Sharky. Join him and his pilot fish for a daily dose of IT
from the trenches.
Submit your true IT tale to email@example.com and if Sharky takes a bite,
he'll send you a sharp Shark shirt!
CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL
Users of Apple's new Maps app in iOS6 are encountering inaccurate maps,
off-kilter points-of-interest, missing streets and addresses and more. Is the
iOS 6 Maps controversy a black eye for Apple?
COMPUTERWORLD'S IT SALARY SURVEY 2012
A majority of IT workers say they're under pressure to increase productivity and
take on new tasks. But the vast majority are still happy they picked IT as their
NEW COMPUTERWORLD JOB BOARD
Search multiple listings now and get new job alerts as they are posted.
Get more IT peer perspective online:
LinkedIn Group: http://cwonline.computerworld.com/t/8245296/869152238/311619/0/
You are currently subscribed to computerworld_security_issues as: firstname.lastname@example.org.
To unsubscribe from this newsletter, go to:
To manage your subscription preferences, go to:
To subscribe to a newsletter, go to:
If you are interested in advertising in this newsletter, please contact: email@example.com
To contact Computerworld, please send an e-mail to firstname.lastname@example.org.
Copyright (C) 2011 Computerworld, 492 Old Connecticut Path, Framingham MA 01701
** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to email@example.com **
Track this Report
0 Comment | Post a comment
Post your Comment
Save thousands of potential victims.
Report spam or phishing email now!
Recently Updated Spam Reports
KINDLY ASSIST.webnode.fr, 184.108.40.206, malicious content, viruses, malwaredomainlist, blacklist, mass spam, guestbook scrapRe: carta urgente de volver de inmediato.icq:721315476 GOOD HACKER FORUM - DO WU Transfer(western union) - Dumps益阳医学高等专科学校毕业证学位证样本定制_Ta[martinolute5：做销售要有强烈的企图心flubjtuwoWEBSITE...<http://news.bbc.co.uk/1/hi/world/europe/859479.stm>Впepвые в Рoссии! Автоpcкий ceминap Джoна Грэя "Мужчины с мapса, женщины c вeнеры"Alert MessageNEW BRANCH OF HILTON HOTEL OFFER JOB VACANT POSTS.
Random Spam Reports
WINNING NOTIFICATIONcry for help Dear Sir/Madam,***PROBABLE SPAM*** URGENT NOTICEInfo Rahsia Kesihatan, Awet Muda, Dan Income Lumayan2Le nouvel iPhone 5s pour vous !仿制二代假身份证+微信：app.15808_smF正宁县办英语四级成绩单_LL北京市丰台区职工大学英语成绩报告单样本定制_eZl