PIV

PIV credentials can now be used with mobile devices

The latest revision of FIPS 201, which sets the requirements for PIV cards, includes credentials for mobile devices and new interfaces to enable access with contactless connections.

iPhone scan

Is the new iPhone's fingerprint scanner a sign of things to come?

If opened to app developers, Apple's Touch ID could give another authentication option to agencies looking to manage mobile devices, especially if other smartphone manufacturers follow suit.

View of cell tower from behind barbed wire fence

Managing cellular access means really managing it, sometimes daily

A system to block contraband cell phones in prisons must be continually tuned to ensure that it covers the required footprint but does not step out of bounds.

Samsung Galaxy Note 8

Will Samsung's tablet strike the right note with government users?

The Galaxy Note 8.0 does everything you need a tablet to do, with enhanced security features that should appeal to government users.

Parchman

Prisons get a new way to stop inmates from using cell phones

A system from Tecore Networks lets prisons establish their own cellular base stations so they can keep prisoners from using illegal phones while giving legitimate users access.

secure text

R U secure? Encrypted texting expands to Android OS.

Silent Circle releases its latest end-to-end encryption tool, which enables secure texting between Apple iOS and Android platforms. A secure, peer-to-peer email app is due next year.

mobile U

Go team: College coursework takes to mobile apps

Universities are teaching students on their own terms, conducting coursework with the help of mobile applications.

mobile device passcode

Which sectors require passcodes for mobile device access?

A sampling of smartphones and tablets by Fiberlink Communications shows government is more likely than other sectors to require strong passcodes for mobile devices.

Combating Trafficking in Persons training app

Training for combatting human trafficking goes mobile

JKO releases a mobile app for DOD’s Trafficking in Person’s general awareness training.

decisions

Deploying mobile devices? A few questions to consider.

Before devices can be secured and managed, agencies should answer questions about GPS tracking, personal/business use and other issues.

MDM

NOAA: From BlackBerry to iPhones, Androids and (maybe) BYOD

As the agency moves to new platforms it is using a cloud-based service to learn how to effectively manage mobility across the enterprise, and possibly allow personal devices.

Police in patrol car talk on radio

3 reasons smartphones aren't ready to replace police radios

Combining cellular and other digital communications with traditional police radio networks increases interoperability and extends coverage areas, but there are limits to its uses.

Topic Resources

  • Avoiding Insider Threats to Enterprise Security

    This white paper explains how IBM Security Privileged Identity Manager provides enhanced security across various IT environments by centralizing and controlling the use of privileged identities.

  • Managing Threats in the Digital Age

    News of recent security failures have not only resulted in significant expense to the affected enterprises, but have significantly damaged consumer trust and brand reputation. The topic of security is now unquestionably a C-suite priority. Organizations must move toward a more systematic, proactive approach to addressing security threats and managing compliance.

  • Beyond the Next Generation: Meeting the Converging Demands of Network Security

    A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and performance.

  • Extending Security Intelligence with Big Data Solutions

    Security intelligence solution from IBM help organizations address the most vexing security challenges, including advanced persistent threats, fraud and insider threats. The solution enables security analysts to extend analysis well beyond typical security data using real-time correlation for continuous insight, custom analytics, and forensic capabilities for evidence gathering

  • Integrating Security into Development, No Pain Required

    In this whitepaper, senior SANS Analyst Dave Shackleford discusses new ways developers and security teams can work together to create more efficient quality control processes to improve application functionality and security while minimizing bugs.