Application Security Architecture Authentication
CertificationsCorporate ComplianceCryptology
Disaster RecoveryEnterprise SecurityExploits
FirewallsIncident HandlingIntrusion Detection
OS SecurityPolicies and ProceduresSecurity Basics
Security ManagementSecurity ToolsServers
StandardsVoIPVulnerability Management
Web SecurityWiFi SecurityWorms and Viruses

Response redefined – ICT and the future of public safety

by Ericsson

Mobile broadband and distributed computing, coupled with industry-wide standardization efforts, can transform emergency response. This paper explains how to use ICT architecture and consulting frameworks to create truly mission-critical, multiagency platforms that enable effective communications and information sharing. At the same time, factors such as affordability and ease of implementation should lead agencies to embrace solutions based on open standards.
» Read more

5G systems – enabling the transformation of industry and society

by Ericsson

A digital transformation is taking place in almost every industry, disrupting and making us rethink our ways of working. Through an unprecedented ability to share information, people and industries are collaborating more, creating solutions that combine many different areas of expertise and overturning traditional business models. This cross-industry transformation has created a need to evolve wireless connectivity for the fifth generation of mobile technology. The goal is to expand the broadband capability of mobile networks, and to provide specific capabilities for consumers and for various industries and society at large unleashing the potential of the Internet of Things.
In this paper, the 5G use cases and their respective requirements are outlined first. The evolution of the network components toward 5G is then presented, followed by a description of the 5G system. Finally, the 5G system is exemplified through three concrete use cases.
» Read more

5G radio access – capabilities and technologies

by Ericsson

The capabilities of 5G wireless access must extend far beyond previous generations of mobile communication. Examples of these capabilities include very high data rates, very low latency, ultra-high reliability, energy efficiency and extreme device densities, and will be realized by the development of LTE in combination with new radio-access technologies. Key technology components include extension to higher frequency bands, access/backhaul integration, device-to-device communication, flexible duplex, flexible spectrum usage, multi-antenna transmission, ultra-lean design, and user/control separation.
» Read more

iOS Security

by Apple

iOS and iOS devices provide advanced security features, and yet they’re also easy to use. Many of these features are enabled by default, so IT departments don’t need to perform extensive configurations. And key security features like device encryption aren’t configurable, so users can’t disable them by mistake. Other features, such as Touch ID, enhance the user experience by making it simpler and more intuitive to secure the device.
This document provides details about how security technology and features are implemented within the iOS platform. It will also help organizations combine iOS platform security technology and features with their own policies and procedures to meet their specific security needs.
» Read more

5G Security

by Ericsson

5G systems are the next step in the evolution of mobile communication and will be a fundamental enabler for the Networked Society. This development creates new security scenarios and requires new security solutions.
As a result, there is a need for a fundamentally new, multi-actor trust model that allows more flexibility. Security for virtualized networks and services should be considered. Attack-resistance and data security must represent basic design criteria for new protocols, while security assurance and compliance have to be more verifiable and measurable. Tackling these challenges will require new tools such as network slicing, trusted computing and alternative ways of handling user identities.
» Read more

Hardening BYOD: Implementing Critical Security Control 3 in a Bring Your Own Device (BYOD) Architecture

by Christopher Jarko

The increasing prevalence of Bring Your Own Device (BYOD) architecture poses many challenges to information security professionals. These include, but are not limited to: the risk of loss or theft, unauthorized access to sensitive corporate data, and lack of standardization and control. This last challenge can be particularly troublesome for an enterprise trying to implement the Center for Internet Security (CIS) Critical Security Controls for Effective Cyber Defense (CSCs). CSC 3, Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations and Servers, calls for hardened operating systems and applications. Even in traditional enterprise environments, this requires a certain amount of effort, but it is much more difficult in a BYOD architecture where computer hardware and software is unique to each employee and company control of that hardware and software is constrained. Still, it is possible to implement CSC 3 in a BYOD environment. This paper will examine options for managing a standard, secure Windows 10 laptop as part of a BYOD program, and will also discuss the policies, standards, and guidelines necessary to ensure the implementation of this Critical Security Control is as seamless as possible.
» Read more

Mobile Device Management

by Michelle Sellers

Mobile device management is an important topic for companies considering the use of a mobile device policy.  There are several vulnerabilities that can be caused from outside sources, not to mention vulnerabilities that come from the inside. McAfee, a leader in antivirus is reporting that the top cyber threats for 2014 are attacks on mobile devices (Gormisky, n.d.). A mobile device that has been attacked can compromise corporate data. Companies need to do the research involved in securing mobile devices before accepting the possibility of “bring your own device” to the workplace.

» Read more