Welcome!

Agile Computing Authors: Zakia Bouachraoui, Yeshim Deniz, Elizabeth White, Liz McMillan, Pat Romanski

Blog Feed Post

Mobile Cyber Security News Weekly – Week of June 1, 2014

Welcome to the Mobile Cyber Security News Weekly, our newest online newsletter. Mobile Cyber Security will focus on the most interesting news, articles and links related to mobile and cyber security, mobile malware, mobile application management, cyber warfare (and more!) that I run across each week.  I am specifically targeting market trend information.

Also read Connected Globe News Weekly
Also read Field Mobility News Weekly
Also read Mobile Commerce News Weekly
Also read Mobile Health News Weekly
Also read Mobility News Weekly

Looking for an enterprise mobility solution?  Read the Mobile Solution Directory Here!

Thundersoft has announced a partnership with Trustonic to introduce secure mobile services to its expansive customer base of smartphone manufacturers supplying developing markets.  Read Original Content

Mobile security startup Lookout is turning smartphones and tablets against gadget thieves with new features.  The new theft alert function added sets out to pinpoint where a gadget might be and, in some cases, even take the thief's picture.  Read Original Content

A New Jersey man foiled a robbery at his home thanks to surveillance cameras and a free app on his smartphone that alerted him to the break-in and allowed him to yell at the startled burglar through a camera’s speakers.  Read Original Content

The True Cost of Mobility - Companies are under tremendous pressure to develop and deploy mobile apps for their business systems, yet the traditional approach to mobile app development typically costs $250K+ and takes 6+ months for a single app. Today IT professionals are exploring platforms that radically reduce costs and time-to-market for their mobile initiatives, especially around complex applications such as SAP, Oracle, or custom applications. Download the whitepaper - https://www.capriza.com/resources/whitepapers/?resource=true-cost-of-enterprise-mobility&adgroup=MES

LG unveiled its latest flagship phone, the G3, and it includes antitheft software that can render the phone unusable if stolen.  The company showcased the so-called "kill switch," along with other security features. The software will allow a user to remotely wipe the data from a phone, as well remotely lock it so a thief can't access personal information.  Read Original Content

Nearly 60 percent of Australians aged 18 to 25 have ditched a smartphone, compared with 40 percent across all age groups, a government-commissioned online security report shows. Of those, less than a third cleared their personal details before discarding their devices – a worrying statistic for online security experts.  Read Original Content
China and the United Nations will hold an international symposium on information and network security in Beijing, said Foreign Ministry spokesman Hong Lei.  It will be the first international conference held by China and the UN on network issues and it is a move by China to promote international cyber security.  Read Original Content

The Australian federal government’s long-awaited Australian Cyber Security Centre will be fully operational in late 2014 - almost two years after it was first announced. Once operational, it will subsume the existing Cyber Security Operations Centre and will also house the national computer emergency response team, CERT Australia.  Read Original Content

Microsoft Ventures, the start-up arm of Microsoft, is opening a new cyber security accelerator in Israel in a bid to capitalize on the nation’s expertise in the field.  Read Original Content

The call for immediate actions to address cyber security is reaching the top levels of global organizations. Cyber risk jumped from 12th to 3rd place in Lloyd's Risk Index 2013, which polled 588 C-level executives and board members at multinationals in April and May of last year.  Read Original Content

Australians are putting themselves at risk of their personal information being hacked with a survey revealing less than a third of smartphone and tablet users install security software. The survey, released by the Government's Federal Communications Department, also showed 40 percent couldn’t identify any signs of online safety breaches.  Read Original Content

Latest Articles on http://mobileenterprisestrategies.blogspot.com

How Many Solutions Does it Take to Implement Enterprise Mobility?
Information Dominance as a Company's Mobile Strategy
Mobile Expert Interview: Mobile Labs' Dan McFall
Highlights from the Enterprise Mobility Focused Conference M6 Mobility xChange Last Week
Mobile Strategies They Don't Teach in Business Schools or Computer Science Labs
Insurance Disrupted - Crowdsourced Policies and Social Marketing

Webinars of Note (Recorded)

Rapidly extend any enterprise application to mobile devices without coding, APIs, or integration.
Virtualization ≠ Mobilization

Whitepapers of Note

A Comparison of the StarMobile MORPH Protocol vs. Traditional Remote Computing Protocols
Don't Get SMACked - How Social, Mobile, Analytics and Cloud are Reshaping the Enterprise
Making BYOD Work for Your Organization
Managing BYOD and Legacy Systems
The Secret to Enterprise Mobile Application Adoption
Solving The Mobile Developer Scarcity Problem
StarMobile Transforms Enterprise Apps into Mobile Apps
The True Cost of Mobility

************************************************************************
Kevin Benedict
Writer, Speaker, Editor
Senior Analyst, Digital Transformation, EBA, Center for the Future of Work Cognizant
View my profile on LinkedIn
Learn about mobile strategies at MobileEnterpriseStrategies.com
Follow me on Twitter @krbenedict
Join the Linkedin Group Strategic Enterprise Mobility
Join the Google+ Community Mobile Enterprise Strategies
Recommended Strategy Book Code Halos
Recommended iPad App Code Halos for iPads

***Full Disclosure: These are my personal opinions. No company is silly enough to claim them. I am a mobility and digital transformation analyst, consultant and writer. I work with and have worked with many of the companies mentioned in my articles.

Read the original blog entry...

More Stories By Kevin Benedict

Kevin Benedict serves as the Senior Vice President, Solutions Strategy, at Regalix, a Silicon Valley based company, focused on bringing the best strategies, digital technologies, processes and people together to deliver improved customer experiences, journeys and success through the combination of intelligent solutions, analytics, automation and services. He is a popular writer, speaker and futurist, and in the past 8 years he has taught workshops for large enterprises and government agencies in 18 different countries. He has over 32 years of experience working with strategic enterprise IT solutions and business processes, and he is also a veteran executive working with both solution and services companies. He has written dozens of technology and strategy reports, over a thousand articles, interviewed hundreds of technology experts, and produced videos on the future of digital technologies and their impact on industries.

IoT & Smart Cities Stories
To Really Work for Enterprises, MultiCloud Adoption Requires Far Better and Inclusive Cloud Monitoring and Cost Management … But How? Overwhelmingly, even as enterprises have adopted cloud computing and are expanding to multi-cloud computing, IT leaders remain concerned about how to monitor, manage and control costs across hybrid and multi-cloud deployments. It’s clear that traditional IT monitoring and management approaches, designed after all for on-premises data centers, are falling short in ...
The deluge of IoT sensor data collected from connected devices and the powerful AI required to make that data actionable are giving rise to a hybrid ecosystem in which cloud, on-prem and edge processes become interweaved. Attendees will learn how emerging composable infrastructure solutions deliver the adaptive architecture needed to manage this new data reality. Machine learning algorithms can better anticipate data storms and automate resources to support surges, including fully scalable GPU-c...
A valuable conference experience generates new contacts, sales leads, potential strategic partners and potential investors; helps gather competitive intelligence and even provides inspiration for new products and services. Conference Guru works with conference organizers to pass great deals to great conferences, helping you discover new conferences and increase your return on investment.
Poor data quality and analytics drive down business value. In fact, Gartner estimated that the average financial impact of poor data quality on organizations is $9.7 million per year. But bad data is much more than a cost center. By eroding trust in information, analytics and the business decisions based on these, it is a serious impediment to digital transformation.
We are seeing a major migration of enterprises applications to the cloud. As cloud and business use of real time applications accelerate, legacy networks are no longer able to architecturally support cloud adoption and deliver the performance and security required by highly distributed enterprises. These outdated solutions have become more costly and complicated to implement, install, manage, and maintain.SD-WAN offers unlimited capabilities for accessing the benefits of the cloud and Internet. ...
Business professionals no longer wonder if they'll migrate to the cloud; it's now a matter of when. The cloud environment has proved to be a major force in transitioning to an agile business model that enables quick decisions and fast implementation that solidify customer relationships. And when the cloud is combined with the power of cognitive computing, it drives innovation and transformation that achieves astounding competitive advantage.
SYS-CON Events announced today that Silicon India has been named “Media Sponsor” of SYS-CON's 21st International Cloud Expo, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Published in Silicon Valley, Silicon India magazine is the premiere platform for CIOs to discuss their innovative enterprise solutions and allows IT vendors to learn about new solutions that can help grow their business.
DXWorldEXPO LLC announced today that "IoT Now" was named media sponsor of CloudEXPO | DXWorldEXPO 2018 New York, which will take place on November 11-13, 2018 in New York City, NY. IoT Now explores the evolving opportunities and challenges facing CSPs, and it passes on some lessons learned from those who have taken the first steps in next-gen IoT services.
SYS-CON Events announced today that CrowdReviews.com has been named “Media Sponsor” of SYS-CON's 22nd International Cloud Expo, which will take place on June 5–7, 2018, at the Javits Center in New York City, NY. CrowdReviews.com is a transparent online platform for determining which products and services are the best based on the opinion of the crowd. The crowd consists of Internet users that have experienced products and services first-hand and have an interest in letting other potential buye...
Founded in 2000, Chetu Inc. is a global provider of customized software development solutions and IT staff augmentation services for software technology providers. By providing clients with unparalleled niche technology expertise and industry experience, Chetu has become the premiere long-term, back-end software development partner for start-ups, SMBs, and Fortune 500 companies. Chetu is headquartered in Plantation, Florida, with thirteen offices throughout the U.S. and abroad.