Welcome!

@ThingsExpo Authors: Elizabeth White, Zakia Bouachraoui, Liz McMillan, Pat Romanski, Yeshim Deniz

Article

Mobile Cyber Security News Weekly

Week of June 1, 2014

Welcome to the Mobile Cyber Security News Weekly, our newest online newsletter. Mobile Cyber Security will focus on the most interesting news, articles and links related to mobile and cyber security, mobile malware, mobile application management, cyber warfare (and more!) that I run across each week.  I am specifically targeting market trend information.

Also read Connected Globe News Weekly
Also read Field Mobility News Weekly
Also read Mobile Commerce News Weekly
Also read Mobile Health News Weekly
Also read Mobility News Weekly

Looking for an enterprise mobility solution?  Read the Mobile Solution Directory Here!

Thundersoft has announced a partnership with Trustonic to introduce secure mobile services to its expansive customer base of smartphone manufacturers supplying developing markets.  Read Original Content

Mobile security startup Lookout is turning smartphones and tablets against gadget thieves with new features.  The new theft alert function added sets out to pinpoint where a gadget might be and, in some cases, even take the thief's picture.  Read Original Content

A New Jersey man foiled a robbery at his home thanks to surveillance cameras and a free app on his smartphone that alerted him to the break-in and allowed him to yell at the startled burglar through a camera's speakers.  Read Original Content

The True Cost of Mobility - Companies are under tremendous pressure to develop and deploy mobile apps for their business systems, yet the traditional approach to mobile app development typically costs $250K+ and takes 6+ months for a single app. Today IT professionals are exploring platforms that radically reduce costs and time-to-market for their mobile initiatives, especially around complex applications such as SAP, Oracle, or custom applications. Download the whitepaper -https://www.capriza.com/resources/whitepapers/?resource=true-cost-of-enterprise-mobility&adgroup=MES

LG unveiled its latest flagship phone, the G3, and it includes antitheft software that can render the phone unusable if stolen.  The company showcased the so-called "kill switch," along with other security features. The software will allow a user to remotely wipe the data from a phone, as well remotely lock it so a thief can't access personal information.  Read Original Content

Nearly 60 percent of Australians aged 18 to 25 have ditched a smartphone, compared with 40 percent across all age groups, a government-commissioned online security report shows. Of those, less than a third cleared their personal details before discarding their devices - a worrying statistic for online security experts.  Read Original Content

China and the United Nations will hold an international symposium on information and network security in Beijing, said Foreign Ministry spokesman Hong Lei.  It will be the first international conference held by China and the UN on network issues and it is a move by China to promote international cyber security.  Read Original Content

The Australian federal government's long-awaited Australian Cyber Security Centre will be fully operational in late 2014 - almost two years after it was first announced. Once operational, it will subsume the existing Cyber Security Operations Centre and will also house the national computer emergency response team, CERT Australia.  Read Original Content

Microsoft Ventures, the start-up arm of Microsoft, is opening a new cyber security accelerator in Israel in a bid to capitalize on the nation's expertise in the field.  Read Original Content

The call for immediate actions to address cyber security is reaching the top levels of global organizations. Cyber risk jumped from 12th to 3rd place in Lloyd's Risk Index 2013, which polled 588 C-level executives and board members at multinationals in April and May of last year.  Read Original Content

Australians are putting themselves at risk of their personal information being hacked with a survey revealing less than a third of smartphone and tablet users install security software. The survey, released by the Government's Federal Communications Department, also showed 40 percent couldn't identify any signs of online safety breaches.  Read Original Content

Latest Articles on http://mobileenterprisestrategies.blogspot.com

How Many Solutions Does it Take to Implement Enterprise Mobility?
Information Dominance as a Company's Mobile Strategy
Mobile Expert Interview: Mobile Labs' Dan McFall
Highlights from the Enterprise Mobility Focused Conference M6 Mobility xChange Last Week
Mobile Strategies They Don't Teach in Business Schools or Computer Science Labs
Insurance Disrupted - Crowdsourced Policies and Social Marketing

Webinars of Note (Recorded)

Rapidly extend any enterprise application to mobile devices without coding, APIs, or integration.
Virtualization ≠ Mobilization

Whitepapers of Note

A Comparison of the StarMobile MORPH Protocol vs. Traditional Remote Computing Protocols
Don't Get SMACked - How Social, Mobile, Analytics and Cloud are Reshaping the Enterprise
Making BYOD Work for Your Organization
Managing BYOD and Legacy Systems
The Secret to Enterprise Mobile Application Adoption
Solving The Mobile Developer Scarcity Problem
StarMobile Transforms Enterprise Apps into Mobile Apps
The True Cost of Mobility

************************************************************************

Kevin Benedict Writer, Speaker, Editor Senior Analyst, Digital Transformation, EBA, Center for the Future of Work Cognizant View my profile on LinkedIn Learn about mobile strategies at MobileEnterpriseStrategies.com Follow me on Twitter @krbenedict Browse the Mobile Solution Directory Join the Linkedin Group Strategic Enterprise Mobility Join the Google+ Community Mobile Enterprise Strategies Recommended Strategy Book Code Halos Recommended iPad App Code Halos for iPads

***Full Disclosure: These are my personal opinions. No company is silly enough to claim them. I am a mobility and digital transformation analyst, consultant and writer. I work with and have worked with many of the companies mentioned in my articles.

More Stories By Kevin Benedict

Kevin Benedict serves as the Senior Vice President, Solutions Strategy, at Regalix, a Silicon Valley based company, focused on bringing the best strategies, digital technologies, processes and people together to deliver improved customer experiences, journeys and success through the combination of intelligent solutions, analytics, automation and services. He is a popular writer, speaker and futurist, and in the past 8 years he has taught workshops for large enterprises and government agencies in 18 different countries. He has over 32 years of experience working with strategic enterprise IT solutions and business processes, and he is also a veteran executive working with both solution and services companies. He has written dozens of technology and strategy reports, over a thousand articles, interviewed hundreds of technology experts, and produced videos on the future of digital technologies and their impact on industries.

IoT & Smart Cities Stories
The platform combines the strengths of Singtel's extensive, intelligent network capabilities with Microsoft's cloud expertise to create a unique solution that sets new standards for IoT applications," said Mr Diomedes Kastanis, Head of IoT at Singtel. "Our solution provides speed, transparency and flexibility, paving the way for a more pervasive use of IoT to accelerate enterprises' digitalisation efforts. AI-powered intelligent connectivity over Microsoft Azure will be the fastest connected pat...
There are many examples of disruption in consumer space – Uber disrupting the cab industry, Airbnb disrupting the hospitality industry and so on; but have you wondered who is disrupting support and operations? AISERA helps make businesses and customers successful by offering consumer-like user experience for support and operations. We have built the world’s first AI-driven IT / HR / Cloud / Customer Support and Operations solution.
Codete accelerates their clients growth through technological expertise and experience. Codite team works with organizations to meet the challenges that digitalization presents. Their clients include digital start-ups as well as established enterprises in the IT industry. To stay competitive in a highly innovative IT industry, strong R&D departments and bold spin-off initiatives is a must. Codete Data Science and Software Architects teams help corporate clients to stay up to date with the mod...
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with expanded DevOpsSUMMIT and FinTechEXPO programs within the DXWorldEXPO agenda. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throug...
Druva is the global leader in Cloud Data Protection and Management, delivering the industry's first data management-as-a-service solution that aggregates data from endpoints, servers and cloud applications and leverages the public cloud to offer a single pane of glass to enable data protection, governance and intelligence-dramatically increasing the availability and visibility of business critical information, while reducing the risk, cost and complexity of managing and protecting it. Druva's...
BMC has unmatched experience in IT management, supporting 92 of the Forbes Global 100, and earning recognition as an ITSM Gartner Magic Quadrant Leader for five years running. Our solutions offer speed, agility, and efficiency to tackle business challenges in the areas of service management, automation, operations, and the mainframe.
The Jevons Paradox suggests that when technological advances increase efficiency of a resource, it results in an overall increase in consumption. Writing on the increased use of coal as a result of technological improvements, 19th-century economist William Stanley Jevons found that these improvements led to the development of new ways to utilize coal. In his session at 19th Cloud Expo, Mark Thiele, Chief Strategy Officer for Apcera, compared the Jevons Paradox to modern-day enterprise IT, examin...
With 10 simultaneous tracks, keynotes, general sessions and targeted breakout classes, @CloudEXPO and DXWorldEXPO are two of the most important technology events of the year. Since its launch over eight years ago, @CloudEXPO and DXWorldEXPO have presented a rock star faculty as well as showcased hundreds of sponsors and exhibitors! In this blog post, we provide 7 tips on how, as part of our world-class faculty, you can deliver one of the most popular sessions at our events. But before reading...
DSR is a supplier of project management, consultancy services and IT solutions that increase effectiveness of a company's operations in the production sector. The company combines in-depth knowledge of international companies with expert knowledge utilising IT tools that support manufacturing and distribution processes. DSR ensures optimization and integration of internal processes which is necessary for companies to grow rapidly. The rapid growth is possible thanks, to specialized services an...
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with expanded DevOpsSUMMIT and FinTechEXPO programs within the DXWorldEXPO agenda. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throug...