Wednesday, February 18, 2009

My all time favorite Dilbert

Can't see someone trying (and failing) to surreptitiously check their email without this Dilbert coming to mind!


Tuesday, February 17, 2009

Mcfee report on Mobile Security

Good reading. It's nice to know that I'm not alone in having concerns as to what's happening - or rather isn't happening - in the enterprise.

Manufacturers get it. Carriers are clearly feeling the pain. Microsoft get it. How long before everyone else wakes up and smells the coffee? Or it is going to require something nasty to happen in order for folks to get the message that there are major risks to implementing this technology without first conducting appropriate due diligence.

http://www.mcafee.com/us/local_content/reports/mobile_security_report_2009.pdf

more related links:
http://www.securecomputing.net.au/News/137422,mobile-manufacturers-express-security-fears.aspx
http://www.computerweekly.com/Articles/2009/02/16/234838/security-a-top-concern-for-mobile-manufacturers-survey.htm
http://www.mcafee.com/us/local_content/reports/mobile_security_report_2009.pdf
Internet Storm Center Comment: http://isc.sans.org/diary.html?storyid=5875

Make this make sense to me, please

Taking it as a given that the only way to effectively use an iPhone - especially if one has any view towards security - is to Jail Break it, why on earth are Apple arranging for anyone who does this to wind up getting first-hand experience of prison showers?

http://blog.wired.com/27bstroke6/2009/02/apple-says-ipho.html

As a propet of doom and gloom, I'd venture that it's silliness like this which brings closer to reality that my prediction about just how ugly things are going to get once a lost iPhone containing critical data hits the news wires. There's some really bad press a comin'. Just watch.

Loved the comment by the guy who says he's already doing everything on his WM phone that the iPhone does, only immediately find myself asking questions such as "Really? What kind of apps? Running on what device?".

Hmmm.

Monday, February 2, 2009

Excellent paper on WM Application Security

My brilliant and talented colleague Dave Field has written a comprehensive technical paper “Windows Mobile Application Security Configuration for Enterprise Deployments.” It recommends how enterprises can take advantage of the powerful security features of Windows Mobile to defend against malicious and unsupported application use. Taking a very pragmatic approach, Dave outlines how various features work and how to implement them.
The paper is available for download on the Enterprise Mobile website, at http://www.enterprisemobile.com/resources/white-papers.htm.

Highly recommended reading. Dave's taken complex material and presented it in a highly readable and understandable fashion.