Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: smartphones
Young provided an update on mobility in the military and how the Pentagon is leveraging and tweaking commercial solutions to put mobile tools in troops' hands.
BlackBerry smartphones and iPhones are increasingly becoming the target of a phishing campaign to infect computers with malware. Users receive an email saying they need to set up a Blackberry ID, but the link it provides installs the malicious software. According to SC Magazine, the the malware can often go undetected by a lot of anti-virus programs.
Federal agencies may be behind the times when it comes to "bring your own device" programs for employees, but federal contractors have been doing it for years. Sheila Jordan from Cisco told the Federal Drive about her company's program, security concerns and benefits beyond savings.
The Defense Information Systems Agency has granted approval for Android-based mobile devices to connect to DoD networks, provided they're secured using a specific set of guidelines
Many agencies are now allowing employees to use their own smartphone devices. But the results of a survey by the National Cyber Security Alliance and McAfee found almost three-quarters of Americans do not have any security software or data protection applications installed on their smartphones.
The goal of the revised FIPS-201-2 will detail at a high level how agencies can integrate secure smart cards with mobile devices. NIST is considering five options for making HSPD-12 cards work with tablets and smart phones.
A growing number of cyber criminals are targeting Android, iPhone and BlackBerry smartphones through apps. Even reputable apps have Trojan copies — which criminals can use to take over a phone, according to ProductReviews.net.
The Veterans Affairs Department wants to hedge its bets when it comes to its planned rollout of up to 100,000 tablet devices. IT leaders worry about the unpredictability of the mobile technology landscape, and don't want to spend millions to develop apps for a platform that risks being superseded by a competitor.
Twenty two percent of Americans say it's acceptable to be connected to their smart phones, PDAs and handheld computers while having sex.
Rep. Rick Boucher, D-Va., is drafting legislation that would require sites and companies seeking to collect location information about you to first provide provide disclosures and ask permission.