Home / Search Results for: bring your own device

Search Results for: bring your own device

NIST Issues Data Security Guidelines for BYOD, Telework Devices

The National Institute of Standards and Technology has introduced draft guidelines that seek to help corporate organizations protect networks from data breaches and other cyber attacks as a result of the adoption of bring-your-own-devices and computers for telework. NIST said Monday the proposed publications suggest the deployment of virtual mobile infrastructure and …

Read More »

DISA Set to Buy Mobile Device Manager; Robert Carey Comments

The Defense Information Systems Agency says it will soon acquire a mobile device management system from an unnamed contractor, Defense Systems  reported Monday. Henry Kenyon writes the system has passed a series of tests DISA has been conducting for several years. The system supports the Defense Department’s mobility plan to …

Read More »

DISA Developing Mobile Device Management Plan

Defense Information Systems Agency officials recently detailed the agency’s plans to develop a mobile strategy in the coming months, FierceGovernment IT reports. DISA plans to establish a policy allowing personnel to use their own device to connect to unclassified networks by fall 2013 at the earliest. In the interim, the …

Read More »

DISA to Develop DoD User Authentication Protocol

The Defense Information Systems Agency is seeking to create a method to help the Department of Defense validate user logins to the latter's information systems. DISA said Thursday it wants to utilize an authentication process to allow users to access information to any DoD network through mobile devices. Additionally, the agency intends to apply a continuous multifactor authentication process to establish and confirm user identification.

Read More »

FERC Outlines Mobile Push

The Federal Energy Regulatory Commission has drawn up plans to build a more mobile workforce as part of its information technology upgrade initiative, the Federal News Radio reported Thursday. Jason Miller writes the agency aims to give employees access to data more openly from any location at any time. “We’ve …

Read More »

Howard Schmidt: Energy Companies Need Continuous Monitoring Practices

Utility companies managing the nation’s critical infrastructure should regularly check for security gaps within their delivery systems, according to the White House’s cybersecurity head. White House Cybersecurity Coordinator Howard Schmidt told attendees of the McAfee public sector conference Wednesday that energy sector must perform active risk management, continuous monitoring and …

Read More »