Security Experts:

Mobile & Wireless
long dotted

NEWS & INDUSTRY UPDATES

Boeing has developed a smartphone called Boeing Black geared mainly toward people working in defense and homeland security.
Oracle introduced the Oracle Mobile Security Suite, a new platform designed to help organizations provide secure access to enterprise applications and data from mobile devices.
Mocana, a provider of security solutions for embedded and mobile devices, introduced Mocana Atlas Extended Enterprise Engine, a new appliance designed to simplify and secure enterprise mobile app deployments.
In an effort to enhance its secure enterprise mobility offerings, Good Technology said that it has signed a definitive agreement to acquire Columbia, Maryland-based BoxTone.
Security researchers and others point out that there may be vulnerabilities in the system used by some 450 million WhatsApp users globally.
Users of iOS devices will find themselves with a new software update to install, thanks to a certificate validation flaw (CVE-2014-1266) in the mobile popular OS.
Bluebox launched a new cloud-based mobile security solution that gives enterprises visibility, control, and security for mobile data, while providing privacy and freedom to employees as they use their mobile devices.
A security researcher demonstrates how the Snapchat app can be used to launch a denial-of-service attack against iPhone users.
Californian leaders want to make it compulsory for smartphones or tablets sold in the state to have built-in "kill switches" to counter the rocketing number of thefts of the devices.
Canadian intelligence agencies can follow the movements of travelers who passed through airports and connected to Wifi systems with mobile phones, tablets and laptops.

FEATURES, INSIGHTS // Mobile & Wireless

rss icon

Ryan Naraine's picture
Security researchers Charlie Miller and Chris Valasek join the podcast to talk about their work hacking the into modern vehicles to manipulate steering, acceleration, speedometers and safety sensors.
Gant Redmon's picture
Being in a public place makes you fair game. So what makes a place private instead of public? This is where that famed “reasonable person” comes in.
Avi Chesla's picture
While Long Term Evolution (LTE) networks bring the promise of relieving traffic jams for mobile operators, they also entail new security risks.
Nick Cavalancia's picture
Company Owned, Personally Enabled devices (COPE) provide a high-degree of centralized control and monitoring while allowing employees to install consumerized, personal-use applications.
Nick Cavalancia's picture
There is no way to deal with the risk that BYOD brings. Between Android and iOS, there are millions of apps readily available for download, countless numbers of which open up doors in BYOD technologies that hackers and cybercriminals can easily stroll through.
Danelle Au's picture
The challenge is how to give users the full advantage of their mobility platform of choice without introducing risks to the business. A key part of that challenge is enabling flexible mobile security options depending on the device and use case
Nimmy Reichenberg's picture
From a security perspective, most consumer devices and services leave much to be desired. The tools at the disposal of security professionals for dealing with consumerization are quite limited and include the ability to Block it, Wrap it, or Allow it and pray.
Dr. Mike Lloyd's picture
The BYOD problem isn’t even about BYOD; it’s about the ability to visualize, understand, and control your whole infrastructure, including this latest addition to the network map.
Nimmy Reichenberg's picture
While BYOD is concerned with the risk from personal devices, BYON (Bring Your Own Network) is a different type of risk
Jon-Louis Heimerl's picture
If regulatory protected information gets onto your device, you are obligated to protect it. Are you fully prepared to guarantee that everything you are doing on your personally managed device meets the obligations of you and your organization to protect sensitive information?