Keys to mobile security: Consistent controls, user common sense

GAO report on mobile threats concludes that certain agencies, and all users, can help improve security.

NOAA, Navy swimming with the SHARCs

Unmanned ocean-going Wave Gliders proving useful for research and, perhaps, much more.

The world's toughest smart phone?

The Nautiz X1 from the Handheld Group also is surprisingly small and light for a rugged phone.

Intel’s big idea: A hefty 27-inch tablet

The Adaptive All-In-One is a desktop PC and also works as a 27-inch, 14-pound tablet PC. But what can you use it for?

What is LTE, and why is it right for a public safety network?

The details of a national public safety network have yet to be worked out, but the consensus is it will be based on the emerging Long Term Evolution standard.

Public safety network has ‘eye-opening’ first real-world test

Police on the street and in the crowd used iPhones for encrypted voice, data and video, free of the congestion that can hamper a commercial wireless network.

RIM wants your BlackBerry to be your access badge

HID Global has a service that would let users replace ID credentials and tokens with their BlackBerry phones. Could it work in a government enterprise?

With QR codes, even security pros play the fool

The codes are a known tool for delivering malware, but a recent experiment showed that security pros will risk a scan for an iPad.

Ultrabooks get tough with the X1

ThinkPad X1 Ultrabook combines speed, performance and security with a rugged design.

3 ways to foil tech 'dumpster divers'

Old servers, drives and other media can be dangerous sources of data leakage; NIST has guidelines for removing data before the hardware goes out the door.

BlackBerry offering $10K per popular app to revitalize its app market

The incentive to developers could help restore interest in government circles.

Scrap the app: Smart-phone users getting wary over privacy

People are starting to get suspicious about what apps take from them, and are declining to download, a Pew study shows.

Topic Resources

  • Avoiding Insider Threats to Enterprise Security

    This white paper explains how IBM Security Privileged Identity Manager provides enhanced security across various IT environments by centralizing and controlling the use of privileged identities.

  • Managing Threats in the Digital Age

    News of recent security failures have not only resulted in significant expense to the affected enterprises, but have significantly damaged consumer trust and brand reputation. The topic of security is now unquestionably a C-suite priority. Organizations must move toward a more systematic, proactive approach to addressing security threats and managing compliance.

  • Beyond the Next Generation: Meeting the Converging Demands of Network Security

    A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and performance.

  • Extending Security Intelligence with Big Data Solutions

    Security intelligence solution from IBM help organizations address the most vexing security challenges, including advanced persistent threats, fraud and insider threats. The solution enables security analysts to extend analysis well beyond typical security data using real-time correlation for continuous insight, custom analytics, and forensic capabilities for evidence gathering

  • Integrating Security into Development, No Pain Required

    In this whitepaper, senior SANS Analyst Dave Shackleford discusses new ways developers and security teams can work together to create more efficient quality control processes to improve application functionality and security while minimizing bugs.