MITRE/ATARC IOT White Paper (November 10, 2015)

MITRE/ATARC IOT White Paper MITRE-ATARC IoT Collaboration Symposium, November 10, 2015 Excerpt The Collaboration Sessions covered three key IoT topics: IoT and Security Architecting IoT Ecosystems Session IoT Driving Changing Dynamics Session Among the recommendations...

The New Wearable Computing Frontier (September/October 2015)

The New Wearable Computing Frontier IT Pro, IEEE Computer Society - September/October 2015 Contributors:Maria R. Lee, Shih Chien University, TaiwanIrena Bojanova, IEEE Senior MemberTom Suder, MobilegovDriven by advances in mobile computing and communications, ambient...

MITRE/ATARC Mobile White Paper (August 12, 2015)

MITRE/ATARC Mobile White Paper MITRE-ATARC Mobile Collaboration Symposium, August 12, 2015 ExcerptThree key mobile topic areas:Mobile App Vetting Tools & TrendsMobile Pilot Challenges and Lessons LearnedAccess Control Patterns for the Mobile Device WorldKey...

Electronic Health Records on Mobile Devices (July, 2015)

Electronic Health Records on Mobile Devices US Department of Commerce, National Cybersecurity Center of Excellence, National Institute of Standards and Technology Published July, 2015 The National Cybersecurity Center of Excellence (NCCoE) released the draft version...

Mitre/ATARC Mobile White Paper (February 18, 2015)

ExcerptFive key mobile topic areas:• Mobile Application Security• Mobile Technologies• Mobile Technology Roadmap• Tactical Mobility• Mobile HealthKey recommendations to Government:• Continue Joint Commercial/Academia/Government Mobile Roadmap Brainstorming• Create...

MITRE/ATARC Mobile White Paper (August 19, 2014)

ExcerptThe Collaboration Sessions covered four key mobility topics:Mobile App Legal & Acquisition Best PracticesImpacts of the Emerging Internet of Things (IoT) on the EnterpriseHow to Embrace Contextually Aware & Wearable ComputingIntegrating Mobility Into...

MITRE/ATARC Mobile White Paper (March 5, 2014)

MITRE/ATARC Mobile White Paper MITRE/ATARC Mobile Collaboration Symposium, March 5, 2014 ExcerptThe Collaboration Sessions covered four key mobile application security topics:Mobile Application Threats and Attack PatternsMobile Application VettingMobile Application...