Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- Mission-critical Apps in the Cloud
- Mobile Device Management
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Protecting the mobile environment
Tuesday - 11/22/2011, 11:08pm EST
Marketing analysts are predicting 55 million tablets being sold this year.
The concept of "Bring Your Own Device" (BYOD) is beginning to plague federal IT professionals whose job is to maintain a safe and secure environment.
On today's show, Tom Kellermann, the CTO at AirPatrol Corporation, shares with listeners his thoughts on wireless situation awareness, managing the mobile risk, as well continuous monitoring.
Protecting the mobile environment means more than guarding against theft, sniffing, malicious code, and direct attack.
Listeners may not know that doing a survey of mobile devices always brings surprising results.
One factor is the ability of systems to know the physical location of a device and be able to prevent that device from working in specific areas of a building.
This is a fascinating mobile security concept called being "contextually aware."
Kellermann also gives his opinions on Advanced Persistent Threats (APT) and anti virus detection.