Search This Blog

Tuesday, February 24, 2009

Cell phone security

NIST document provides guidelines on cell phone and PDA security
Network World logo

Security Strategies Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by HP
rule

HP Product Guide: Storage Resource Management
Get the facts on Storage Resource management. Learn what it is by reviewing the pros and cons with additional information including buying tips, test reviews, and product comparisons. Learn more today.

rule

Spotlight Story
Cell phone security

M. E. Kabay By M. E. Kabay
Computer scientists Wayne Jansen and Karen Scarfone of the Computer Security Division of the Information Technology Laboratory at the National Institute of Standards and Technology (NIST) have written a new (October 2008) Special Publication entitled "Guidelines on Cell Phone and PDA Security," which summarizes the security issues and provides recommendations for protecting sensitive information carried on these devices. Read full story

M. E. Kabay, PhD, CISSP-ISSMP, specializes in security and operations management consulting services. CV online.

Related News:

Guidelines for securing IEEE 802.11i wireless networks A useful free document, one not requiring registration and having 162 pages, is "Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i," which is Special Publication 800-97 from the National Institute of Standards and Technology.

The Habit: or There and Back Again to the NISTy Mountains Like Bilbo Baggins of Bag End, Hobbiton, whose story "There and Back Again" I have read and reread with pleasure over five decades, I find myself returning many times to favorite haunts such as the NIST list of Special Publications to see how my old friends are doing with their books of wisdom and dragon-slaying lore.

NSA identifies top 25 programming errors The National Security Agency, working with MITRE Corp., SANS, and dozens of industry experts from many other organizations, has published a valuable list of the top 25 most dangerous programming errors.

Is compliance with standards achieving the goal of protecting data? The prevalence of data theft has led to increased enforcement of compliance with standards to protect data - surely a Good Thing, right? Well, maybe not in the way compliance is sometimes being enforced. Longtime colleague Bob Gezelter contributes his thoughts today on the unreasoning application of security standards.

Podcast: Why ex-employees are stealing your data Dr. Larry Ponemon talks with Tim Greene about a study that showed 59% of employees who had quit, were fired or laid off admitting to stealing company data. What's being stolen? How can companies stop this? Ponemon and Greene discuss these issues. (15:09)

10 Steps for Mitigating Data Risk During a Merger Merger and acquisition activity stands to increase as global markets struggle to stay afloat during the worst economic slowdown in decades. What will you do when you find out you're about to acquire or consolidate with another firm or division? Are you aware of the risks you may be inheriting? What data is going to demand the highest availability? What IT regulations will you have to address and how do you know if existing controls already address them?

Arrests soar after new wiretap law Criminal arrests made under more powerful wiretapping laws have increase by 96% following reforms that make it easier for police to intercept and access telecommunications.

February giveaways from Cisco Subnet and Microsoft Subnet
Up for grabs: One American Express gift card worth $250 from Global Knowledge; One Microsoft training course worth $2,995 from Global Knowledge; 15 copies each of the hot book titles Voice over IP Security, and CCNA Wireless Official Exam Certification Guide and 15 copies of Exchange Server 2007 How-To: Real Solutions for Exchange Server 2007 SP1 Administrators. Get all the entry details here.


Tweet to compete
Tweet to competeSmart social networking has become essential for most IT execs.

2009 MWC highlights
Top 10 hot spot safety tipsMobile World Congress: Cool gadgets and hot new tech from the world's largest exhibition for the mobile industry.

Sponsored by HP
rule

HP Product Guide: Storage Resource Management
Get the facts on Storage Resource management. Learn what it is by reviewing the pros and cons with additional information including buying tips, test reviews, and product comparisons. Learn more today.

rule

A Simplified Data Center - Live March 12
Contain costs and improve efficiency and reliability by simplifying your data center architecture. On March 12, data center design and implementation experts share in-depth advice on new approaches and examples of deployments - including price, performance and savings.
Register today for this Live Webcast.


The Power of LAN Test Tools.
Successfully deploy a wired/wireless Ethernet network and keep it running with exceptional up-time. Ensure your network is ready for new technologies by running assessment tests that provide you with the data you need. Resolve connectivity issues and quickly address network performance complaints. Get all of the details today.
Download this whitepaper now.

 

02/24/09

Today's most-read stories:

  1. Conflicker worm gets an evil twin
  2. Citrix drops price of hypervisor to zero
  3. Bring in the iPhone clones
  4. Five fantastic open source tools for Windows admins
  5. 9 dirty tricks: Social engineers' favorite pick-up lines
  6. More than half of booted workers steal data on way out
  7. Proposed law might make Wi-Fi users help cops
  8. Lessons from a light socket
  9. A $99,999 keyboard is the best bargain I've seen yet
  10. Forget the Oscars: Sit back for the 404 Awards


Product Guides
Get side-by-side product comparisons, buying tips, market trend information, case studies and more with Network World's Patch Management Product Guide.
Visit now



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: