Mobile phones with web code in background

Hybrid apps: The future of mobile development?

Agencies deciding on whether to provide mobile services via an on-device app or a Web app might want to consider the advantages of combining the two.

People walking in city during snowstorm

During snowstorm Nemo, cell-phone alert systems worked, sort of

The Commercial Mobile Alert System, designed to alert people in targeted areas of serious emergencies and pending disasters, got the message out, but only to users with the right phones.

Investigators looking at cellphone

Forensics tool helps police crack suspects' cell phones

Paraben's Device Seizure 6 can break passwords, track where a phone has been and map the complete file system, including deleted data.

Complex gear system in cloud

Authentication with cloud, BYOD: It's complicated

The growth of IT services across the enterprise makes identifying users complex, but three government efforts aim to standardize and simplify access control.

Man with smartphone in range of sensor network

Sensor sensibility: How it can help make smart phones secure

Greater functionality for smart phones can mean bigger security concerns, but their new capabilities could also be used to protect them.

Disappointed looking smartphone user

When smart-phone technology hits the wall

Even smart phones have their limits, but developers are finding ways to build sophisticated sensors than can connect to phones and expand mobile networks.

Soldier providing security on a raid

Smart phones as sensors: locating snipers, or parking spots

Agencies see a lot of potential in using sensor networks made up of smart phones for any number of military and civilian uses.

Handheld Nautiz X1 rugged smart phone loaded with Cummings Engineering SAIFE encryption software

A smart phone that's rugged, submersible and NSA-secure

The SAIFE Sentry X1 puts FIPS 140-2 and NSA encryption into an ultra-rugged casing.

Mobile workers with laptop and smartphone

BYOD is changing the telework picture and advocacy group's name

The Telework Exchange, an advocate for teleworking in government, has changed its name to the Mobile Work Exchange, a shift that reflects a new reality.

DuraBook U12Ci from GammaTech

Tablet/laptop for field work combines ruggedness and security

DuraBook U12Ci from GammaTech is a rugged tablet/laptop that includes a fingerprint reader.

Mobile device management

Don't manage mobile devices, manage the enterprise

Mobile devices bring so many security risks into networks that governance must move beyond device management to encompass much broader enterprise issues.

BlackBerry 10

BES 10's release paves the way for new BlackBerry devices

RIM's server software for the new OS will support Android and iOS devices, along with all the new features in BlackBerry 10.

Topic Resources

  • Avoiding Insider Threats to Enterprise Security

    This white paper explains how IBM Security Privileged Identity Manager provides enhanced security across various IT environments by centralizing and controlling the use of privileged identities.

  • Managing Threats in the Digital Age

    News of recent security failures have not only resulted in significant expense to the affected enterprises, but have significantly damaged consumer trust and brand reputation. The topic of security is now unquestionably a C-suite priority. Organizations must move toward a more systematic, proactive approach to addressing security threats and managing compliance.

  • Beyond the Next Generation: Meeting the Converging Demands of Network Security

    A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and performance.

  • Extending Security Intelligence with Big Data Solutions

    Security intelligence solution from IBM help organizations address the most vexing security challenges, including advanced persistent threats, fraud and insider threats. The solution enables security analysts to extend analysis well beyond typical security data using real-time correlation for continuous insight, custom analytics, and forensic capabilities for evidence gathering

  • Integrating Security into Development, No Pain Required

    In this whitepaper, senior SANS Analyst Dave Shackleford discusses new ways developers and security teams can work together to create more efficient quality control processes to improve application functionality and security while minimizing bugs.