by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
FCW : April 15, 2014
Full 10 question interview online at: FCW.com/2014StandCybersecurity The complexity of cybersecurity demands a systematic approach QHow can an agency balance the need for better security with the need to provide a good user experience? A Understanding risk is critical when securing any digital environment. Today, mobile computing is where we see the most prevalent tradeoffs between user experience and security. Customers want the convenience and ef ciencies that come from access to mobile apps. However, the greatest security risks are migrating to mobile, and these issues are limiting its full adoption. Developing essential security standards for application development can begin to address the inconsistency in security pro les that many mobile computing environments experience. At Northrop Grumman, we address security and user experience by taking a systematic approach and looking at mobile security in a holistic, risk-based way. Those customers who take a risk-based approach to developing enterprise cybersecurity policy and related solutions can deploy their resources and implement controls in a way that s best for them, resulting in a better user experience and lower risk. QIs mobile malware winning? What can agencies do to better protect themselves? A At the moment, mobile malware is winning. That s because existing networks have not been architected with malware in mind, and the mobile environment is particularly vulnerable. Adversaries are using persistent and innovative approaches to get access to networks, and the only way agencies can tackle this is to secure the entire enterprise, including the device itself. You need a strong device security architecture, encryption for both data at rest and in motion, and identity management and authentication solutions to secure mobile users. Two-factor authentication is the classic approach, but there are also biometrics and other ways you can approach identity management. The same way you determine who gets access to certain types of data in a corporate environment, you want to have a similar process in place for a mobile environment. Mobile malware is best managed with non-signature based detection technology. Putting that technology at the network gateway allows you to isolate data and applications that are potentially suspect. We recommend that agencies develop end-to-end trusted mobility solutions that go beyond the gateway approach to include on-device malware detection and identity management. At Northrop Grumman, we re developing innovative security solutions in the mobile data environment, leveraging ideas from our university consortium and developing them through our own technology investments to help advance technology quickly. Sponsored Content Jim Myers Sector Vice President and General Manager, Cyber Solutions Division, Northrop Grumman Information Systems "Understanding your complete risk posture is essential. It is the difference between being proactive and in a good defensive position, versus reactive."
March 30, 2014
April 30, 2014