BlackBerry Samsung Knox

DOD OKs BlackBerry, Android devices, expanding its mobile options

The department approves Security Technical Implementation Guides for BlackBerry smart phones and tablets with BES 10, along with Samsung's Android Knox.

Business users share files over mobile network

Novell, NTP introduce secure mobile file sharing solutions

Services can help enable BYOD by allowing mobile users to securely share documents.

PhoneSat 1 during high altitude balloon test

NASA's smart-phone satellites launch new era in space communications

The small satellites built around Android phones, launched Sunday, mark a trend toward small, inexpensive satellites for a variety of uses.

BlackBerry Z10

Does BlackBerry Z10 have the goods for government?

The new smart phone's security features could be what keeps BlackBerrys in the hands of government employees.

AOptix iphone biometric tool

App, case turns iPhone into on-the-spot biometric scanner

The hardware and software package from AOptix would allow police and the military to take fingerprint, iris, face and voice readings in the field.

Fingerprint authentication for mobile cloud device

6 steps to secure mobile access

The IdentityX platform leverages the federal cloud and up to six ID factors to authenticate users, even those using devices not managed by the enterprise.

Smartphone with lock and key in it

A checklist for keeping mobile apps secure

Mobile devices' broad range of access opens up vulnerabilities for apps, but there are ways to close them.

iPhone has most vulnerabilities but Android is the most attacked

iPhone has most vulnerabilities, so why is Android the most attacked?

Android, with only a handful of vulnerabilities reported in 2012, was the OS of choice for malware writers, Symantec says.

OptiView XG Network Analysis Tablet

Real-time network stress tests help admins prepare for the worst

Version 10 of the OptiView XG Network Analysis Tablet helps identify problems before they crop up.

Job recruitment via smartphones and social media

Tools help agencies boost recruiting via social media

NGA.NET's SocialSmashed and Social Apply helps agencies recruit young workers via platforms they're familiar with.

Northwoods Compass CoPilot tablet suite for social workers

Tablet suite saves case workers their most valuable commodity

Social workers in Fairfield County, Ohio, no longer have to schedule "paperwork days" after adopting Compass CoPilot for tablets.

Rescue squad interoperable communications

Ultimate public safety network is far off, but there are comm options

While first responders wait for the creation of a single nationwide public safety network, a variety of technologies are already providing interoperability.

Topic Resources

  • Avoiding Insider Threats to Enterprise Security

    This white paper explains how IBM Security Privileged Identity Manager provides enhanced security across various IT environments by centralizing and controlling the use of privileged identities.

  • Managing Threats in the Digital Age

    News of recent security failures have not only resulted in significant expense to the affected enterprises, but have significantly damaged consumer trust and brand reputation. The topic of security is now unquestionably a C-suite priority. Organizations must move toward a more systematic, proactive approach to addressing security threats and managing compliance.

  • Beyond the Next Generation: Meeting the Converging Demands of Network Security

    A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and performance.

  • Extending Security Intelligence with Big Data Solutions

    Security intelligence solution from IBM help organizations address the most vexing security challenges, including advanced persistent threats, fraud and insider threats. The solution enables security analysts to extend analysis well beyond typical security data using real-time correlation for continuous insight, custom analytics, and forensic capabilities for evidence gathering

  • Integrating Security into Development, No Pain Required

    In this whitepaper, senior SANS Analyst Dave Shackleford discusses new ways developers and security teams can work together to create more efficient quality control processes to improve application functionality and security while minimizing bugs.