|By Kevin Benedict||
|June 8, 2014 02:30 PM EDT||
Welcome to the Mobile Cyber Security News Weekly, our newest online newsletter. Mobile Cyber Security will focus on the most interesting news, articles and links related to mobile and cyber security, mobile malware, mobile application management, cyber warfare (and more!) that I run across each week. I am specifically targeting market trend information.
Also read Connected Globe News Weekly
Also read Field Mobility News Weekly
Also read Mobile Commerce News Weekly
Also read Mobile Health News Weekly
Also read Mobility News Weekly
Looking for an enterprise mobility solution? Read the Mobile Solution Directory Here!
Thundersoft has announced a partnership with Trustonic to introduce secure mobile services to its expansive customer base of smartphone manufacturers supplying developing markets. Read Original Content
Mobile security startup Lookout is turning smartphones and tablets against gadget thieves with new features. The new theft alert function added sets out to pinpoint where a gadget might be and, in some cases, even take the thief's picture. Read Original Content
A New Jersey man foiled a robbery at his home thanks to surveillance cameras and a free app on his smartphone that alerted him to the break-in and allowed him to yell at the startled burglar through a camera's speakers. Read Original Content
The True Cost of Mobility - Companies are under tremendous pressure to develop and deploy mobile apps for their business systems, yet the traditional approach to mobile app development typically costs $250K+ and takes 6+ months for a single app. Today IT professionals are exploring platforms that radically reduce costs and time-to-market for their mobile initiatives, especially around complex applications such as SAP, Oracle, or custom applications. Download the whitepaper -https://www.capriza.com/resources/whitepapers/?resource=true-cost-of-enterprise-mobility&adgroup=MES
LG unveiled its latest flagship phone, the G3, and it includes antitheft software that can render the phone unusable if stolen. The company showcased the so-called "kill switch," along with other security features. The software will allow a user to remotely wipe the data from a phone, as well remotely lock it so a thief can't access personal information. Read Original Content
Nearly 60 percent of Australians aged 18 to 25 have ditched a smartphone, compared with 40 percent across all age groups, a government-commissioned online security report shows. Of those, less than a third cleared their personal details before discarding their devices - a worrying statistic for online security experts. Read Original Content
China and the United Nations will hold an international symposium on information and network security in Beijing, said Foreign Ministry spokesman Hong Lei. It will be the first international conference held by China and the UN on network issues and it is a move by China to promote international cyber security. Read Original Content
The Australian federal government's long-awaited Australian Cyber Security Centre will be fully operational in late 2014 - almost two years after it was first announced. Once operational, it will subsume the existing Cyber Security Operations Centre and will also house the national computer emergency response team, CERT Australia. Read Original Content
Microsoft Ventures, the start-up arm of Microsoft, is opening a new cyber security accelerator in Israel in a bid to capitalize on the nation's expertise in the field. Read Original Content
The call for immediate actions to address cyber security is reaching the top levels of global organizations. Cyber risk jumped from 12th to 3rd place in Lloyd's Risk Index 2013, which polled 588 C-level executives and board members at multinationals in April and May of last year. Read Original Content
Australians are putting themselves at risk of their personal information being hacked with a survey revealing less than a third of smartphone and tablet users install security software. The survey, released by the Government's Federal Communications Department, also showed 40 percent couldn't identify any signs of online safety breaches. Read Original Content
Latest Articles on http://mobileenterprisestrategies.blogspot.com
How Many Solutions Does it Take to Implement Enterprise Mobility?
Information Dominance as a Company's Mobile Strategy
Mobile Expert Interview: Mobile Labs' Dan McFall
Highlights from the Enterprise Mobility Focused Conference M6 Mobility xChange Last Week
Mobile Strategies They Don't Teach in Business Schools or Computer Science Labs
Insurance Disrupted - Crowdsourced Policies and Social Marketing
Webinars of Note (Recorded)
Rapidly extend any enterprise application to mobile devices without coding, APIs, or integration.
Virtualization ≠ Mobilization
Whitepapers of Note
A Comparison of the StarMobile MORPH Protocol vs. Traditional Remote Computing Protocols
Don't Get SMACked - How Social, Mobile, Analytics and Cloud are Reshaping the Enterprise
Making BYOD Work for Your Organization
Managing BYOD and Legacy Systems
The Secret to Enterprise Mobile Application Adoption
Solving The Mobile Developer Scarcity Problem
StarMobile Transforms Enterprise Apps into Mobile Apps
The True Cost of Mobility
Kevin Benedict Writer, Speaker, Editor Senior Analyst, Digital Transformation, EBA, Center for the Future of Work Cognizant View my profile on LinkedIn Learn about mobile strategies at MobileEnterpriseStrategies.com Follow me on Twitter @krbenedict Browse the Mobile Solution Directory Join the Linkedin Group Strategic Enterprise Mobility Join the Google+ Community Mobile Enterprise Strategies Recommended Strategy Book Code Halos Recommended iPad App Code Halos for iPads
***Full Disclosure: These are my personal opinions. No company is silly enough to claim them. I am a mobility and digital transformation analyst, consultant and writer. I work with and have worked with many of the companies mentioned in my articles.
"This week we're really focusing on scalability, asset preservation and how do you back up to the cloud and in the cloud with object storage, which is really a new way of attacking dealing with your file, your blocked data, where you put it and how you access it," stated Jeff Greenwald, Senior Director of Market Development at HGST, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Jan. 20, 2017 09:45 AM EST Reads: 5,492
DevOps is being widely accepted (if not fully adopted) as essential in enterprise IT. But as Enterprise DevOps gains maturity, expands scope, and increases velocity, the need for data-driven decisions across teams becomes more acute. DevOps teams in any modern business must wrangle the ‘digital exhaust’ from the delivery toolchain, "pervasive" and "cognitive" computing, APIs and services, mobile devices and applications, the Internet of Things, and now even blockchain. In this power panel at @...
Jan. 20, 2017 09:45 AM EST Reads: 2,911
SYS-CON Events announced today that Catchpoint Systems, Inc., a provider of innovative web and infrastructure monitoring solutions, has been named “Silver Sponsor” of SYS-CON's DevOps Summit at 18th Cloud Expo New York, which will take place June 7-9, 2016, at the Javits Center in New York City, NY. Catchpoint is a leading Digital Performance Analytics company that provides unparalleled insight into customer-critical services to help consistently deliver an amazing customer experience. Designed ...
Jan. 20, 2017 09:15 AM EST Reads: 6,375
Jan. 20, 2017 08:30 AM EST Reads: 4,733
Jan. 20, 2017 08:15 AM EST Reads: 4,703
Jan. 20, 2017 08:15 AM EST Reads: 4,909
Jan. 20, 2017 08:00 AM EST Reads: 4,256
Jan. 20, 2017 07:15 AM EST Reads: 2,968
Jan. 20, 2017 07:00 AM EST Reads: 6,858
Jan. 20, 2017 07:00 AM EST Reads: 9,069
Jan. 20, 2017 06:15 AM EST Reads: 1,623
Jan. 20, 2017 06:15 AM EST Reads: 3,644
Jan. 20, 2017 06:15 AM EST Reads: 5,499
Jan. 20, 2017 05:00 AM EST Reads: 2,481
Jan. 20, 2017 04:00 AM EST Reads: 3,953