A mobile phone that someone lost on the beach

Mobile security guide: Assume a device will fall into malicious hands

NIST has updated its guidance for securely managing mobile devices, addressing advances in the technology and the move toward BYOD since its original publication in 2008.

Peeking into phone metadata

NSA's intell gathering puts the spotlight on metadata

Metadata is valuable for extracting knowledge from smaller subsets of data for intelligence-gathering as well as for energy, weather and public safety research, experts say.

Back of police car with words emergency dial 911

Text-to-911: Call when you can, text when you must

As text-to-911 service begins appear around the country, the FCC, public safety agencies and carriers warn that it is a complement to and not a substitute for voice calls in an emergency.

Durham emergency communications center

When NextGen 911 services show up, cloud-based call centers will be ready

Durham, N.C., is one a handful of jurisdictions that have moved 911 call centers to the cloud, preparing to implement a full range of IP-based services as they become available.

Labor iPhone app can help employees keep the boss in check

Labor Department's smart phone application helps workers keep track of hours.

Ambulance rushing to emergency

App would give 911 operators control of callers' smart phones

The Android app being developed at the University of North Texas would let dispatchers use a smart phone's camera and sensors to get a better view of an emergency.

IPv6 use up at Virginia Tech

The switch to IPv6 is on: Who’s out in front?

A year after the global launch, traffic using IPv6 has doubled, with some mobile networks, university campuses and government agencies driving the switch.

Mobile data floating through hands

From an $8,150 laptop to disposable smart-phone satellites: A mobile timeline

Fueled by government research, advances in portable computers, untethered phones and wireless communication standards ushered in today's anytime, anyplace way of doing business.

DARPA looking for ideas for mobile ad hoc networks or MANETs

Call ahead: The next 5 years of mobile computing

Mobile technology has changed a lot in the past 30 years. It may change even more in the next five.

BlackBerry Q10

BlackBerry Q10 features a real keyboard, smart ID card support

The company's new phone harkens to the days of old with a physical keyboard, while adding new functionality and security features with Version 10.1 of the OS.

Steps going into the clouds

The next 5 years: Everything converges and rides in the cloud

Big data, analytics, mobile computing and social media will blend together, with services doled out by cloud brokers.

Servers in the path of an approaching tornado

When disaster strikes, will federal data be safe?

Data volume is up, backup systems are nearing capacity and several factors have limited testing, leading feds to fear that systems aren't ready for recovery, a MeriTalk survey finds.

Topic Resources

  • Avoiding Insider Threats to Enterprise Security

    This white paper explains how IBM Security Privileged Identity Manager provides enhanced security across various IT environments by centralizing and controlling the use of privileged identities.

  • Managing Threats in the Digital Age

    News of recent security failures have not only resulted in significant expense to the affected enterprises, but have significantly damaged consumer trust and brand reputation. The topic of security is now unquestionably a C-suite priority. Organizations must move toward a more systematic, proactive approach to addressing security threats and managing compliance.

  • Beyond the Next Generation: Meeting the Converging Demands of Network Security

    A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and performance.

  • Extending Security Intelligence with Big Data Solutions

    Security intelligence solution from IBM help organizations address the most vexing security challenges, including advanced persistent threats, fraud and insider threats. The solution enables security analysts to extend analysis well beyond typical security data using real-time correlation for continuous insight, custom analytics, and forensic capabilities for evidence gathering

  • Integrating Security into Development, No Pain Required

    In this whitepaper, senior SANS Analyst Dave Shackleford discusses new ways developers and security teams can work together to create more efficient quality control processes to improve application functionality and security while minimizing bugs.