by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
FCW : April 15, 2013
inherently outside an of ce, such as federal border patrol agents and other eld workers or military personnel serving overseas. Additionally, pressure from next-gen- eration workers is driving mobility. "We ve got an entire generation of folks entering the workforce that have grown up with these tools, and that s re- ally drastically changing the model that they are demanding in terms of their work environment," Golden said. "They want to use devices that they prefer, not a mandated one. They don t want to be carrying around multiple devices." Feeling secure in security As mobile usage proliferates, so does the potential for harm. The volume of mali- cious attacks rose 650 percent in ve years, and the number of incidents such as denial-of-service attacks and unau- thorized access to government computer systems that were reported to the U.S. Computer Emergency Readiness Team grew eight-fold, according to an Oc- tober 2011 report called "Weaknesses Continue Amid New Federal Efforts to Implement Requirements" by the Gov- ernment Accountability Of ce. Feds recognize the urgency for safety measures. In the survey, 74 percent of respondents said employees could unknowingly bring threats into an agency s IT infrastructure via their mobile devices. The biggest concern, SPONSORED CONTENT "You ve really got to be able to understand your user mission requirements and how they re evolving: How are the people using these untethered devices using them to do their jobs day in and day out? That s a moving target as people figure out what works for them." -- Jack Golden, director of the Secure Mobility and Special Communications Group at AT&T Government Solutions IDEAL MOBILE SECURITY ENVIRONMENT A survey of federal defense and civilian information technology executives found that when it comes to mobile security, their wish list looks like this: 84% want anti-virus and anti-malware device scanning. 84% want encrypted data transport. 84% want built-in compliance security certification. 77% want Secure Sockets Layer protocol architecture. 71% want the ability to monitor and enforce agency policy within the carrier infrastructure. 65% want root or "jailbreak" detection. 64% want centralized administrative console. 63% want policy routing Source: January/February 2013 survey by FCW and Beacon Technology Partners
March 30, 2013
April 30, 2013