Resources

Smart@work Blog

mobile security

Timothy Jackson | May 17, 2017

WannaCry

Whenever history seemed to repeat itself, my Granny used to quip, “same song, different verse.” As the WannaCry (WNCRY) ransomware spread like wildfire in a dry forest, I heard the familiar refrain and discordant notes of previous worms: Blaster (2003), Welchia “Nachi” (2003), and Conflicker (2008). Each of these worms spread via well known flaws in...

Read More →
Timothy Jackson | March 30, 2017

NY - Cybersecurity Regulations

The web of security and privacy regulations continues to grow this month as the New York Department of Financial Services (DFS) became the latest regulator to impose cybersecurity...

Read More →
Ojas Rege | March 28, 2017

EMM-CA-Law

There is a major global trend in compliance towards codifying into the law the concept of reasonable, common sense security standards. Compliance is moving...

Read More →
Timothy Jackson | March 10, 2017

Secure the Internet of things

“It always seems impossible until it’s done.” – Nelson Mandela

Researchers at Google and the CWI Institute in Amsterdam recently announced that they had successfully found a SHA-1 collision. In other words, they found two messages that produce the same output when run through the SHA-1 hash algorithm. This is a...

Read More →
David Schwartzberg | February 23, 2017

Last week, I attended the RSA Conference and spent some time talking to colleagues, Tim Jackson and Sean Ginevan, as well as Domingo Guerra, President and Founder of MobileIron's Ecosystem Partner,...

Read More →
Fran Thorpe | February 22, 2017

Healthcare Industry Has Highest Adoption of Apple DEP and VPP
Every February the Moscone Center in San Francisco becomes the destination to learn the latest on how “to fight cyber threats and proactively manage risk” (RSA Conference). This year, the halls were crowded with information on...

Read More →
James Plouffe | February 13, 2017

Healthcare Industry Has Highest Adoption of Apple DEP and VPP

The healthcare industry lives on the bleeding edge of mobility, claiming some of the most innovative and life-changing use cases for mobile technology. Security is a top concern for most industries, but this is especially true in healthcare. From patient records to payment information, healthcare organizations face strict regulation...

Read More →
Sean Frazier | December 21, 2016

Sometimes You Just Have to Be Certified
Who would have thought in this year 2016 (almost 2017) I would be writing a blog post about S/MIME? Having spent my formative computing years at cc:Mail (and later Lotus), I spent a lot of time working with public sector companies and espousing the wisdom of securing your email using this offshoot version of PKI. Later, I would work at...

Read More →
David Schwartzberg | August 15, 2016

On July 30, I attended Black Hat in Las Vegas with fellow MobileIroners - Rob Jerdonek, Senior Staff Software Engineer; James Plouffe, Lead Solutions Architect; and James Saturnio, Senior Solutions Architect....

Read More →
Carl Spataro | August 8, 2016

hipaa-action

A recent $650,000 settlement agreement under Health Insurance Portability and Accountability Act of 1996 (HIPAA) makes it clear that an effective enterprise mobility management (EMM) solution is a requirement for compliance with the privacy and security rules of HIPAA.

On June 24, 2016, the Department of Health and Human Services’ Office for Human Rights...

Read More →

Pages