Can't see someone trying (and failing) to surreptitiously check their email without this Dilbert coming to mind!
Wednesday, February 18, 2009
Tuesday, February 17, 2009
Mcfee report on Mobile Security
Good reading. It's nice to know that I'm not alone in having concerns as to what's happening - or rather isn't happening - in the enterprise.
Manufacturers get it. Carriers are clearly feeling the pain. Microsoft get it. How long before everyone else wakes up and smells the coffee? Or it is going to require something nasty to happen in order for folks to get the message that there are major risks to implementing this technology without first conducting appropriate due diligence.
http://www.mcafee.com/us/local_content/reports/mobile_security_report_2009.pdf
more related links:
http://www.securecomputing.net.au/News/137422,mobile-manufacturers-express-security-fears.aspx
http://www.computerweekly.com/Articles/2009/02/16/234838/security-a-top-concern-for-mobile-manufacturers-survey.htm
http://www.mcafee.com/us/local_content/reports/mobile_security_report_2009.pdf
Internet Storm Center Comment: http://isc.sans.org/diary.html?storyid=5875
Manufacturers get it. Carriers are clearly feeling the pain. Microsoft get it. How long before everyone else wakes up and smells the coffee? Or it is going to require something nasty to happen in order for folks to get the message that there are major risks to implementing this technology without first conducting appropriate due diligence.
http://www.mcafee.com/us/local_content/reports/mobile_security_report_2009.pdf
more related links:
http://www.securecomputing.net.au/News/137422,mobile-manufacturers-express-security-fears.aspx
http://www.computerweekly.com/Articles/2009/02/16/234838/security-a-top-concern-for-mobile-manufacturers-survey.htm
http://www.mcafee.com/us/local_content/reports/mobile_security_report_2009.pdf
Internet Storm Center Comment: http://isc.sans.org/diary.html?storyid=5875
Make this make sense to me, please
Taking it as a given that the only way to effectively use an iPhone - especially if one has any view towards security - is to Jail Break it, why on earth are Apple arranging for anyone who does this to wind up getting first-hand experience of prison showers?
http://blog.wired.com/27bstroke6/2009/02/apple-says-ipho.html
As a propet of doom and gloom, I'd venture that it's silliness like this which brings closer to reality that my prediction about just how ugly things are going to get once a lost iPhone containing critical data hits the news wires. There's some really bad press a comin'. Just watch.
Loved the comment by the guy who says he's already doing everything on his WM phone that the iPhone does, only immediately find myself asking questions such as "Really? What kind of apps? Running on what device?".
Hmmm.
http://blog.wired.com/27bstroke6/2009/02/apple-says-ipho.html
As a propet of doom and gloom, I'd venture that it's silliness like this which brings closer to reality that my prediction about just how ugly things are going to get once a lost iPhone containing critical data hits the news wires. There's some really bad press a comin'. Just watch.
Loved the comment by the guy who says he's already doing everything on his WM phone that the iPhone does, only immediately find myself asking questions such as "Really? What kind of apps? Running on what device?".
Hmmm.
Monday, February 2, 2009
Excellent paper on WM Application Security
My brilliant and talented colleague Dave Field has written a comprehensive technical paper “Windows Mobile Application Security Configuration for Enterprise Deployments.” It recommends how enterprises can take advantage of the powerful security features of Windows Mobile to defend against malicious and unsupported application use. Taking a very pragmatic approach, Dave outlines how various features work and how to implement them.
The paper is available for download on the Enterprise Mobile website, at http://www.enterprisemobile.com/resources/white-papers.htm.
Highly recommended reading. Dave's taken complex material and presented it in a highly readable and understandable fashion.
The paper is available for download on the Enterprise Mobile website, at http://www.enterprisemobile.com/resources/white-papers.htm.
Highly recommended reading. Dave's taken complex material and presented it in a highly readable and understandable fashion.
Subscribe to:
Posts (Atom)