Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- Government Perspectives on Mobility and the Cloud
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Reimagining the Next Generation of Government
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
How to secure mobile devices at your agency
Tuesday - 2/19/2013, 9:21pm EST
This year we will see new hardware and operating systems, all in a world of thousands of apps.
No wonder federal information technology professionals are looking for solutions to manage this mess.
One option to consider is using hardware.
Today's interview is with Glenn Schoonover from Koolspan.
They recommend a solution that uses a micro SD card for each device. This card can be encrypted so the operating system cannot be altered.
During the interview Schoonover elucidates upon the variations of using software and passwords for securing mobile devices. Then, he contrasts that with the success of using micro SD cards.
Most security experts have predicted the end of passwords.
Users just have too many to worry about and tend to use the same password that leads to dangerous exploits being run.
There is a current report from NIST which gives guidelines for using hardware authentication for mobile devices.
Nobody has a crystal ball that will show what will replace passwords, it could be something as exotic as voice recognition.
However, it is important for all federal information professionals to listen to options that may fit their specific circumstances.