Remove Applications Remove Authentication Remove Big Data Remove Malware
article thumbnail

Security attacks and countermeasures

Cloud Musings

The outcomes further noted that such concerns create barriers to the adoption of critical technologies that drive value and growth: mobility, cloud and big data. In addition, several large data breaches have raised the awareness of cyber security in the consciousness of the general population. Most Active Malware Today.

Security 159
article thumbnail

Identify yourself for MIM - A Screw's Loose

A Screw's Loose

He was kind enough to place things like MDM (Mobile Device Management) and MAM (Mobile Application Management) in the diagram for us. Your developers look at the API and figure out what data matches the requirements they were given to build that app. Tags Applications. In this description though, we are looking at MAM, not MIM.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

The Cart before the Horse - A Screw's Loose

A Screw's Loose

Due to this, they want to map the identity of the user reporting the expense and encrypt any data cached on the phone as well as allow offline access, since there may not always be coverage for the device. They map out how to access the expense system to submit the expense, and how to give access to the data. Tags Applications.

Mobile 56
article thumbnail

Barn Doors - A Screw's Loose

A Screw's Loose

We should be taking care of our data through its whole life cycle, you never really know where it’s going to end up or how it’s going to get there. Let’s start with the basics like encrypting our data while it sits in the data center. Tags Applications. Uncategorized. Windows Phone. Crapplications. Enterprise Mobility.

Mobile 60
article thumbnail

You want me to do what?!? A mobile strategy challenge!

A Screw's Loose

To keep the nasties out while keeping our data in. We run anti-virus and anti-malware suites. Build the keys into the apps that you design to use that data. Use 2-factor authentication by using certificates to enable access to the data. Render the data unusable. Tags Applications. Revoke the keys.

Mobile 78