TITLE

Security: What will be hot in 2008?

AUTHOR(S)
Antonopoulos, Andreas
PUB. DATE
January 2008
SOURCE
Network World;1/7/2008, Vol. 25 Issue 1, p30
SOURCE TYPE
Trade Publication
DOC. TYPE
Editorial
ABSTRACT
The author predicts the development in security for 2008. He said that there will be more security threats on mobile devices due to the increasing enterprise adoption of mobile platforms. Furthermore, he said that hard-drive encryption on the desktop will go on and will be distributed to the data center. He adds that there will be an increase in the virtualization-based classification of laptops and desktops for security reasons.
ACCESSION #
28321062

 

Related Articles

  • Strategies for Securing Safety Messages with Fixed Key Infrastructure in Vehicular Network. Mozayani, Nasser; Barzegar, Maryam; Madani, Hoda // Proceedings of World Academy of Science: Engineering & Technolog;Dec2008, Vol. 48, p978 

    Vehicular communications play a substantial role in providing safety in transportation by means of safety message exchange. Researchers have proposed several solutions for securing safety messages. Protocols based on a fixed key infrastructure are more efficient in implementation and maintain...

  • A day in the life of mobile data. Allen, Martin // Management Services;Winter2005, Vol. 49 Issue 4, p14 

    The article discusses the importance of mobile devices to corporations. It relates a story wherein an employee's negligence of securing company data can result to planned or opportunistic theft. Mobile devices are a significant, increasing, and productive part of the information infrastructure...

  • Take mobile defense seriously. Cattell, Jonathan // SC Magazine: For IT Security Professionals (15476693);Mar2011, Vol. 22 Issue 3, p18 

    The author stresses the importance for mobile operators to be aware of the magnitude of mobile threats. He mentions the results of a study which indicate lack of pressure from subscribers in key security concerns as a factor behind the lag among mobile operators in terms of the implementation of...

  • SONICWALL TZ 190 NETWORK SECURITY APPLIANCE LAUNCHED.  // Networks Update;Dec2006, p4 

    The article focuses on the SonicWALL TZ 190 network security appliance launched by SonicWALL Inc. It allows users to instantly create a secure 3G wireless broadband network without the need for a fixed Internet connection. The appliance satisfies business requirements for instantly deployed...

  • Modeling and analysis of intrusion detection integrated with batch rekeying for dynamic group communication systems in mobile ad hoc networks. Jin-Hee Cho; Ing-Ray Chen // Wireless Networks (10220038);May2010, Vol. 16 Issue 4, p1157 

    We investigate performance characteristics of secure group communication systems (GCSs) in mobile ad hoc networks that employ intrusion detection techniques for dealing with insider attacks tightly coupled with rekeying techniques for dealing with outsider attacks. The objective is to identify...

  • Protect mobile device data.  // Communications News;Oct2003, Vol. 40 Issue 10, p6 

    Stresses the importance of protecting mobile device data. Incidence in which a company gains a vested interest in protecting mobile device data; Steps to take when a device is lost or stolen; Benefits from device-management solutions.

  • Trojan hits Windows PDAs for first time. Bedbarz, Ann // Network World;8/9/2004, Vol. 21 Issue 32, p1 

    After finding the third malicious program targeting wireless devices in fewer than 60 days, security specialists are warning that it is only a matter of time before attackers will launch a serious attack against mobile telephones and personal digital assistants (PDA). Malicious programs...

  • SPOTLIGHT SHINES on high-tech security. Davis, Mari // Modern Bulk Transporter;Jan2005, Vol. 67 Issue 7, p34 

    This article reports that Qualcomm Inc. is offering new security features for the OmniTRACS satellite mobile communications system. New features include a Vehicle Immobilization Device and a Security Integration Package. This system allows carriers to track their assets continuously and...

  • Securing mobile terminals for the future. Alves, Tiago // Portable Design;Apr2005, Vol. 11 Issue 4, p18 

    This paper emphasizes the importance of security in the design of portable terminals. Increasing content value is driven by new 3G networks, and high-value content such as video clips, premium music content, sports, and news are seen as a big part of that. Content providers have long been...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics