Wednesday, October 08, 2014

Mobile Cyber Security News Weekly – Week of October 5, 2014

Welcome to the Mobile Cyber Security News Weekly, our newest online newsletter. Mobile Cyber Security will focus on the most interesting news, articles and links related to mobile and cyber security, mobile malware, mobile application management, cyber warfare (and more!) that I run across each week.  I am specifically targeting market trend information.

Also read Connected Globe News Weekly
Also read Field Mobility News Weekly
Also read Mobile Commerce News Weekly
Also read Mobile Health News Weekly
Also read Mobility News Weekly

Looking for an enterprise mobility solution?  Read the Mobile Solution Directory Here!

Gartner predicts 75 percent of mobile security breaches by 2017 will be the result of mobile application misconfigurations, rather than the outcome of deeply technical attacks on mobile devices. Read Original Content

Ericsson and SAP are collaborating to securely deliver network-enabled cloud solutions, which will provide users with secure access to their business apps and content on mobile devices. Read Original Content

While mobile devices are an integral part of the workplace, cyber security practices and budgets in organizations are not keeping pace with the growing number of devices that must be managed and kept secure—according to a new study issued by Raytheon Company and conducted by the Ponemon Institute. Read Original Content

With the MobileCloud™ Platform and end-to-end mobile quality management suite, Perfecto Mobile enables the world’s leading brands to test, monitor and deliver 5 star mobile applications. Globally distributed development and QA teams can test thousands of REAL mobile devices and collaborate in real-time to continuously develop, test and monitor user experience in real life market conditions.  Contact us at http://www.perfectomobile.com/articles/contact-us.  This newsletter is sponsored in part by Perfecto Mobile.

Pro-democracy protesters in Hong Kong have found their phones hit with malicious software that bears many of the hallmarks of past attacks by the People's Liberation Army, according an Israeli computer security firm. Read Original Content

Lost and stolen mobile devices increasingly challenge companies' mobile security efforts. The McPherson Sentinel reported on a U.S. Cellular survey of smartphone users, which found 58 percent of people had a smartphone damaged, lost or stolen. Read Original Content

AVAST Software has announced that avast! Mobile Security has surpassed 100 million downloads. Read Original Content

A cyber attack this summer on JPMorgan Chase compromised the accounts of 76 million households and seven million small businesses, a tally that dwarfs previous estimates by the bank and puts the intrusion among the largest ever. Read Original Content

Register for Perfecto Mobile's webinar on October 7 and learn how the “shift testing left” dynamic is impacting Developers and Testers. You'll learn how Perfecto Mobilecan facilitate this while supporting your Agile and Continuous Integration effort. The webinar includes a hands-on demonstration of the MobileCloud. Register here: http://bit.ly/1nH42g4

SingTel and FireEye will invest up to US $50 million (S $63.8 million) over the next five years in new advanced security operation centers in Singapore and Australia, as well as training and developing professionals in the area of cyber security. Read Original Content

Four teenage hackers have been charged with breaking into the systems of the U.S. Army and Microsoft in order to steal over $100 million in intellectual property. Read Original Content

Latest Articles on http://mobileenterprisestrategies.blogspot.com


Mobile Expert Interviews: Citrix's Brian Dye
Mobile Expert Interviews: Oracle's Lyle Ekdahl

Mobile Expert Interviews: Oracle's Kaj Van De Loo
Mobile Expert Interviews: Oracle's Chris Tonas
Mobile Expert Interviews: StarMobile's CEO Todd Fryburger
Mobile Expert Interviews: Oracle's Amit Avery
Mobile Expert Interviews: Oracle's Denis Tyrell
10 Steps to Implementing Big Data and Code Halo Strategies

Webinars of Note (Recorded)


Virtualization ≠ Mobilization


Whitepapers of Note


A Comparison of the StarMobile MORPH Protocol vs. Traditional Remote Computing Protocols

Don't Get SMACked - How Social, Mobile, Analytics and Cloud are Reshaping the Enterprise
Making BYOD Work for Your Organization


************************************************************************

Kevin Benedict
Writer, Speaker, Senior Analyst
Digital Transformation, EBA, Center for the Future of Work Cognizant
View my profile on LinkedIn
Learn about mobile strategies at MobileEnterpriseStrategies.com
Follow me on Twitter @krbenedict
Subscribe to Kevin'sYouTube Channel
Join the Linkedin Group Strategic Enterprise Mobility
Join the Google+ Community Mobile Enterprise Strategies
Recommended Strategy Book Code Halos
Recommended iPad App Code Halos for iPads

***Full Disclosure: These are my personal opinions. No company is silly enough to claim them. I am a mobility and digital transformation analyst, consultant and writer. I work with and have worked with many of the companies mentioned in my articles.