Security

The Global IT Crisis and Third Party Vulnerabilities

This week’s global IT crisis affecting businesses around the world should be a wake up call to us all.  DMA requirements for mandatory third party access to the operating system will make personal smartphones and tablets vulnerable to new and currently unimaginable emerging threats.

Learn More +

Taking spyware and other mobile threats seriously

Last March, in the forward to the White House Cybersecurity strategy, the President wrote, “[W]hen we pick up our smart phones to keep in touch with loved ones, log on to social media to share our ideas with one another, or connect to the Internet to run a business, we need the ability to trust that the underlying digital ecosystem is safe, reliable, and secure.”

Learn More +

Adam Golodner: Global trust and technology networks: Beware the trifurcation

Recently, I attended the annual Munich Security Conference and came away with a deepening concern about what I’m calling the “trifurcation” of the global technology ecosystem. The trifurcation is a further balkanization of the technology ecosystem as the West and China pull away from each other’s products and services, which is causing a bifurcation of global networks and data flows.

Learn More +

Our CISA Zero Trust Comment

We share the view that mobile devices “present unique opportunities and challenges in adopting comprehensive zero trust models” and applaud CISA’s efforts to advance ZT from a mobile device perspective – especially given the dynamically changing and critical mobile threat environment. As mobile devices become even more essential to the way the government works, the way federal workers do their jobs, and the way agencies deliver services, it’s become even more essential that leaders incorporate proven trustworthy principles in their enterprise mobility strategies,

Learn More +