SYS-CON MEDIA Authors: Sean Houghton, Glenn Rossman, Ignacio M. Llorente, Xenia von Wedel, Peter Silva

Article

Mobile Cyber Security News Weekly

Week of January 12, 2014

Welcome to the Mobile Cyber Security News Weekly, our newest online newsletter. Mobile Cyber Security will focus on the most interesting news, articles and links related to mobile and cyber security, mobile malware, mobile application management, cyber warfare (and more!) that I run across each week.  I am specifically targeting market trend information.

Also read Enterprise Mobility Asia News Weekly
Also read Field Mobility News Weekly
Also read M2M News Weekly
Also read Mobile Commerce News Weekly
Also read Mobile Health News Weekly
Also read Mobility News Weekly

Looking for an enterprise mobility solution?  Read the Mobile Solution Directory Here!

According to Infonetics, the mobile messaging security market rose 70 percent in 2013 as telecom operators have stepped up battle against spam. Read Original Content

A study by the Ponemon Institute, a security research center, and Lumension, a provider of end-point management and security, revealed 75 percent of IT security professionals said mobile devices will pose the biggest threat to companies' security in 2014, up from just nine percent who said the same in 2010. Read Original Content

IBM inventors have patented a technique that can enable businesses to improve cloud security and support secure transactions by preventing mobile devices from accessing software code that has been maliciously or inadvertently modified after it was encrypted. Read Original Content

The True Cost of Mobility - Companies are under tremendous pressure to develop and deploy mobile apps for their business systems, yet the traditional approach to mobile app development typically costs $250K+ and takes 6+ months for a single app. Today IT professionals are exploring platforms that radically reduce costs and time-to-market for their mobile initiatives, especially around complex applications such as SAP, Oracle, or custom applications. Download the whitepaper - https://www.capriza.com/resources/whitepapers/?resource=true-cost-of-enterprise-mobility&adgroup=MES

A researcher has discovered several security vulnerabilities in 40 personal banking apps from 60 of the world's biggest banks. Testing only iOS devices, Ariel Sanchez from IOActive found 90 percent of the apps contain non-SSL links, which means that a hacker could potentially intercept the traffic and inject random JavaScript/HTML code in order to create a fake login phishing attempt. Read Original Content

IBM Labs has introduced new technology intended to improve the security of cloud applications and mobile users. The technology aims to help businesses increase cloud security and support secure transactions by preventing mobile devices from accessing malicious software code, even if it was encrypted after it became infected. Read Original Content

BlackBerry CEO John Chen announced the company's plan to open a security innovation center in Washington DC. Chen underlined the importance of mobile security and said BlackBerry was reaffirming its commitment to work closely with government partners to help build products and policy for the public and private sectors. Read Original Content

By 2018 the oil and gas industry will be spending up to EUR 1.37 billion on cyber security. The increased demand to protect a multi-billion dollar global industry is being spurred on by the ever-growing cyber threat across the globe. Read Original Content

Over the holiday, separate security research teams have uncovered a security flaw in Samsung's Knox security system which is designed to secure data on the company's line of Galaxy Android smartphones. Read Original Content


More than 40 percent of Android-based smartphone and tablet owners in the UAE do not use any security software to protect their devices against cyber-threats, according to a survey conducted by B2B International and Kaspersky Lab in summer 2013. Read Original Content

The biggest salary increases for IT professionals are for roles in big data analytics, e-commerce and mobile and IT security, according to the Robert Half Technology 2014 Salary Guide. Read Original Content

Recent Articles by Kevin Benedict

Mobile Expert Interview: Mary Brittain-White
Mobile Expert Interview: Glenn Johnson and Kevin Benedict
Mobile Expert Interview: Yuval Scarlat on Cloud Mobility
Mind the Gap - Enterprise Mobility and Digital Transformation
Mobile Expert Interviews: Vaidy Iyer on Cloud Mobility and PaaS
GEOINT, Google Field Trip, GIS and the Digital World
A New Perspective on Enterprise Mobility and 2014 Requirements, Part 2

Webinars of Note (Recorded)

Rapidly extend any enterprise application to mobile devices without coding, APIs, or integration.

Whitepapers of Note

Don't Get SMACked - How Social, Mobile, Analytics and Cloud are Reshaping the Enterprise
Making BYOD Work for Your Organization
Managing BYOD and Legacy Systems
The Secret to Enterprise Mobile Application Adoption
Solving The Mobile Developer Scarcity Problem
The True Cost of Mobility

More Stories By Kevin Benedict

Kevin Benedict is the Senior Analyst for Digital Transformation at Cognizant, a writer, speaker and SAP Mentor Alumnus. Follow him on Twitter @krbenedict. He is a popular speaker around the world on the topic of digital transformation and enterprise mobility. He maintains a busy schedule researching, writing and speaking at events in North America, Asia and Europe. He has over 25 years of experience working in the enterprise IT solutions industry.

Latest Stories
Mobile commerce traffic is surpassing desktop, yet less than 20% of sales in the U.S. are mobile commerce sales. In his session at 15th Cloud Expo, Dan Franklin, Segment Manager, Commerce, at Verizon Digital Media Services, defined mobile devices and discussed how next generation means simplification. It means taking your digital content and turning it into instantly gratifying experiences.
“DevOps is really about the business. The business is under pressure today, competitively in the marketplace to respond to the expectations of the customer. The business is driving IT and the problem is that IT isn't responding fast enough," explained Mark Levy, Senior Product Marketing Manager at Serena Software, in this SYS-CON.tv interview at DevOps Summit, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
The Internet of Things is a misnomer. That implies that everything is on the Internet, and that simply should not be - especially for things that are blurring the line between medical devices that stimulate like a pacemaker and quantified self-sensors like a pedometer or pulse tracker. The mesh of things that we manage must be segmented into zones of trust for sensing data, transmitting data, receiving command and control administrative changes, and peer-to-peer mesh messaging. In his session a...
"Ulunsoft is a start-up that focuses on how enterprises build cloud-based IT infrastructure for business," explained Haibo Zhu, President of Ulunsoft Corp, in this SYS-CON.tv interview at Cloud Expo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
"At our booth we are showing how to provide trust in the Internet of Things. Trust is where everything starts to become secure and trustworthy. Now with the scaling of the Internet of Things it becomes an interesting question – I've heard numbers from 200 billion devices next year up to a trillion in the next 10 to 15 years," explained Johannes Lintzen, Vice President of Sales at Utimaco, in this SYS-CON.tv interview at @ThingsExpo, held Nov 4–6, 2014, at the Santa Clara Convention Center in San...
As enterprises engage with Big Data technologies to develop applications needed to meet operational demands, new computation fabrics are continually being introduced. To leverage these new innovations, organizations are sacrificing market opportunities to gain expertise in learning new systems. In his session at Big Data Expo, Supreet Oberoi, Vice President of Field Engineering at Concurrent, Inc., discussed how to leverage existing infrastructure and investments and future-proof them against e...
“The year of the cloud – we have no idea when it's really happening but we think it's happening now. For those technology providers like Zentera that are helping enterprises move to the cloud - it's been fun to watch," noted Mike Loftus, VP Product Management and Marketing at Zentera Systems, in this SYS-CON.tv interview at Cloud Expo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
"For over 25 years we have been working with a lot of enterprise customers and we have seen how companies create applications. And now that we have moved to cloud computing, mobile, social and the Internet of Things, we see that the market needs a new way of creating applications," stated Jesse Shiah, CEO, President and Co-Founder of AgilePoint Inc., in this SYS-CON.tv interview at 15th Cloud Expo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
"Desktop as a Service is emerging as a very big trend. One of the big influencers of this – for Esri – is that we have a large user base that uses virtualization and they are looking at Desktop as a Service right now," explained John Meza, Product Engineer at Esri, in this SYS-CON.tv interview at Cloud Expo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
SYS-CON Events announced today that Gridstore™, the leader in hyper-converged infrastructure purpose-built to optimize Microsoft workloads, will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. Gridstore™ is the leader in hyper-converged infrastructure purpose-built for Microsoft workloads and designed to accelerate applications in virtualized environments. Gridstore’s hyper-converged infrastructure is the ...
"People are a lot more knowledgeable about APIs now. There are two types of people who work with APIs - IT people who want to use APIs for something internal and the product managers who want to do something outside APIs for people to connect to them," explained Roberto Medrano, Executive Vice President at SOA Software, in this SYS-CON.tv interview at Cloud Expo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
"Application monitoring and intelligence can smooth the path in a DevOps environment. In a DevOps environment you see constant change. If you are trying to monitor things in a constantly changing environment, you're going to spend a lot of your job fixing your monitoring," explained Todd Rader, Solutions Architect at AppDynamics, in this SYS-CON.tv interview at DevOps Summit, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
AppDynamics, the application intelligence leader for software-defined businesses, announced the general availability of the AppDynamics Fall '14 Release. Serving the combined needs of IT and business teams across the enterprise, the latest release provides a comprehensive view across all aspects of digital performance in ultra large scale deployments. AppDynamics delivers Application Intelligence by building out advanced capabilities across the key areas of analytics, unified monitoring and D...
In addition, Tesora adds the popular enterprise distribution from Mirantis to the Tesora OpenStack Database Certification Program ensuring compatibility with both NoSQL and SQL database management systems on Trove and eliminating the headache of enterprises having to test integration on their own. "We're providing Mirantis customers with the most production-ready OpenStack Trove implementation, saving the work and time necessary to ensure compatibility," said Ken Rugg, CEO of Tesora. "Working...
Docker containerization is gaining rapid popularity with Software-as-a-Service (SaaS) developers because of clear benefits such as simplified and continuous app delivery. Enterprise developers also want to leverage Docker for easy provisioning and efficient testing, but IT has unique needs that Docker does not solve out-of-the-box, such as security and access control, supporting heterogeneous infrastructure, apps and app stacks, backup and recovery, visibility and monitoring, and integration. Ho...