Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
Protecting the mobile environment
Tuesday - 11/22/2011, 11:08pm EST
Marketing analysts are predicting 55 million tablets being sold this year.
The concept of "Bring Your Own Device" (BYOD) is beginning to plague federal IT professionals whose job is to maintain a safe and secure environment.
On today's show, Tom Kellermann, the CTO at AirPatrol Corporation, shares with listeners his thoughts on wireless situation awareness, managing the mobile risk, as well continuous monitoring.
Protecting the mobile environment means more than guarding against theft, sniffing, malicious code, and direct attack.
Listeners may not know that doing a survey of mobile devices always brings surprising results.
One factor is the ability of systems to know the physical location of a device and be able to prevent that device from working in specific areas of a building.
This is a fascinating mobile security concept called being "contextually aware."
Kellermann also gives his opinions on Advanced Persistent Threats (APT) and anti virus detection.