CI Tools and Best Practices in the Cloud

Continuous Integration

Subscribe to Continuous Integration: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Continuous Integration: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Continuous Integration Authors: Jason Bloomberg, Yeshim Deniz, Elizabeth White, Pat Romanski, Liz McMillan

Related Topics: Continuous Integration

Blog Feed Post

Mobile Cyber Security News Weekly – Week of October 5, 2014

Welcome to the Mobile Cyber Security News Weekly, our newest online newsletter. Mobile Cyber Security will focus on the most interesting news, articles and links related to mobile and cyber security, mobile malware, mobile application management, cyber warfare (and more!) that I run across each week.  I am specifically targeting market trend information.

Also read Connected Globe News Weekly
Also read Field Mobility News Weekly
Also read Mobile Commerce News Weekly
Also read Mobile Health News Weekly
Also read Mobility News Weekly

Looking for an enterprise mobility solution?  Read the Mobile Solution Directory Here!

Gartner predicts 75 percent of mobile security breaches by 2017 will be the result of mobile application misconfigurations, rather than the outcome of deeply technical attacks on mobile devices. Read Original Content

Ericsson and SAP are collaborating to securely deliver network-enabled cloud solutions, which will provide users with secure access to their business apps and content on mobile devices. Read Original Content

While mobile devices are an integral part of the workplace, cyber security practices and budgets in organizations are not keeping pace with the growing number of devices that must be managed and kept secure—according to a new study issued by Raytheon Company and conducted by the Ponemon Institute. Read Original Content

With the MobileCloud™ Platform and end-to-end mobile quality management suite, Perfecto Mobile enables the world’s leading brands to test, monitor and deliver 5 star mobile applications. Globally distributed development and QA teams can test thousands of REAL mobile devices and collaborate in real-time to continuously develop, test and monitor user experience in real life market conditions.  Contact us at http://www.perfectomobile.com/articles/contact-us.  This newsletter is sponsored in part by Perfecto Mobile.

Pro-democracy protesters in Hong Kong have found their phones hit with malicious software that bears many of the hallmarks of past attacks by the People's Liberation Army, according an Israeli computer security firm. Read Original Content

Lost and stolen mobile devices increasingly challenge companies' mobile security efforts. The McPherson Sentinel reported on a U.S. Cellular survey of smartphone users, which found 58 percent of people had a smartphone damaged, lost or stolen. Read Original Content

AVAST Software has announced that avast! Mobile Security has surpassed 100 million downloads. Read Original Content

A cyber attack this summer on JPMorgan Chase compromised the accounts of 76 million households and seven million small businesses, a tally that dwarfs previous estimates by the bank and puts the intrusion among the largest ever. Read Original Content

Register for Perfecto Mobile's webinar on October 7 and learn how the “shift testing left” dynamic is impacting Developers and Testers. You'll learn how Perfecto Mobilecan facilitate this while supporting your Agile and Continuous Integration effort. The webinar includes a hands-on demonstration of the MobileCloud. Register here: http://bit.ly/1nH42g4

SingTel and FireEye will invest up to US $50 million (S $63.8 million) over the next five years in new advanced security operation centers in Singapore and Australia, as well as training and developing professionals in the area of cyber security. Read Original Content

Four teenage hackers have been charged with breaking into the systems of the U.S. Army and Microsoft in order to steal over $100 million in intellectual property. Read Original Content

Latest Articles on http://mobileenterprisestrategies.blogspot.com


Mobile Expert Interviews: Citrix's Brian Dye
Mobile Expert Interviews: Oracle's Lyle Ekdahl

Mobile Expert Interviews: Oracle's Kaj Van De Loo
Mobile Expert Interviews: Oracle's Chris Tonas
Mobile Expert Interviews: StarMobile's CEO Todd Fryburger
Mobile Expert Interviews: Oracle's Amit Avery
Mobile Expert Interviews: Oracle's Denis Tyrell
10 Steps to Implementing Big Data and Code Halo Strategies

Webinars of Note (Recorded)


Virtualization ≠ Mobilization


Whitepapers of Note


A Comparison of the StarMobile MORPH Protocol vs. Traditional Remote Computing Protocols

Don't Get SMACked - How Social, Mobile, Analytics and Cloud are Reshaping the Enterprise
Making BYOD Work for Your Organization


************************************************************************

Kevin Benedict
Writer, Speaker, Senior Analyst
Digital Transformation, EBA, Center for the Future of Work Cognizant
View my profile on LinkedIn
Learn about mobile strategies at MobileEnterpriseStrategies.com
Follow me on Twitter @krbenedict
Subscribe to Kevin'sYouTube Channel
Join the Linkedin Group Strategic Enterprise Mobility
Join the Google+ Community Mobile Enterprise Strategies
Recommended Strategy Book Code Halos
Recommended iPad App Code Halos for iPads

***Full Disclosure: These are my personal opinions. No company is silly enough to claim them. I am a mobility and digital transformation analyst, consultant and writer. I work with and have worked with many of the companies mentioned in my articles.

Read the original blog entry...

More Stories By Kevin Benedict

Kevin Benedict serves as the Senior Vice President, Solutions Strategy, at Regalix, a Silicon Valley based company, focused on bringing the best strategies, digital technologies, processes and people together to deliver improved customer experiences, journeys and success through the combination of intelligent solutions, analytics, automation and services. He is a popular writer, speaker and futurist, and in the past 8 years he has taught workshops for large enterprises and government agencies in 18 different countries. He has over 32 years of experience working with strategic enterprise IT solutions and business processes, and he is also a veteran executive working with both solution and services companies. He has written dozens of technology and strategy reports, over a thousand articles, interviewed hundreds of technology experts, and produced videos on the future of digital technologies and their impact on industries.