| |||||||||||||
CITJ Mobile Security 2014 : Cutter IT Journal Call for Papers on Mobile Security | |||||||||||||
Link: http://blog.cutter.com/2014/09/23/call-for-papers-mobile-security-managing-the-madness/ | |||||||||||||
| |||||||||||||
Call For Papers | |||||||||||||
Mobile devices are rapidly over taking PC usage providing employees the convenience of using their mobile devices to perform their jobs wherever and whenever they see fit. This has given rise to a whole new set of challenges as business data and systems can be accessed anywhere/anytime. The benefits of BYOD are vast, as are the risks.
An upcoming issue of Cutter IT Journal seeks insight on the steps that can be taken to manage and mitigate the major risks at both the organizational and individual level. ARTICLE IDEAS DUE 27 OCTOBER. FINAL ARTICLES DUE 24 NOVEMBER, 2014. Topics may include, but are not limited to, the following: * Is mobile security any different than regular security in a PC or Internet context? * What are some threats that are unique to mobile, like baseband OS attacks? * What is the more vulnerable attack point — the device or the cloud services that support them? * What are the best practices for building a secure mobile application? * What have we learned from recent privacy breaches that can inform our own mobile security “hygiene?” * In the era of BYOD, how does enterprise IT deal with mobile security? For more information: http://blog.cutter.com/2014/09/23/call-for-papers-mobile-security-managing-the-madness/ |
|