Sep 232014

As mobile computing has made sophisticated, digitally-mediated interactions possible in both personal/consumer and business-like capacities (BYOD) – the market and the challenges associated with it have exploded.

Taking a step back to when the technologies that underpin mobile computing and networking were developed, it was assumed that each user had some level of expertise, that the use cases were quite limited in scope, and that the overall numbers of users were constrained. Fast-forward to present day, the massive scale of mobile computing adoption, the broad scope of supported use cases, and the “naive” user base has created a number of serious issues that the IT industry must grapple with now. Chief among these problems is mobile security.

The subject of mobile security has never been more in the public spotlight than now, with most of the recent attention centered on pilfered celebrity pictures. Hosting services like Apple’s iCloud were blamed, but regular non-celebrity images have also been compromised via apps and services like the “ephemeral” Snapchat. Private pictures are the tiniest tip of the iceberg now that every mobile device is potentially accessing all manners of financial, health, and other sensitive personal information.

Meanwhile in the enterprise, mobile devices are rapidly over taking PC usage providing employees the convenience of using their mobile devices to perform their jobs wherever and whenever they see fit. This has given rise to a whole new set of challenges as business data and systems can be accessed anywhere/anytime. The benefits of BYOD are vast, as are the risks.

An upcoming issue of Cutter IT Journal with Guest Editor Sebastian Hassinger will address mobile security from a practical perspective, analyzing the major features of the mobile security landscape and providing practical guidance on steps that can be taken to mitigate the major risks at both the organizational and individual level.

Topics may include, but are not limited to, the following:

  • Is mobile security any different than regular security in a PC or Internet context?
  • What are some threats that are unique to mobile, like baseband OS attacks?
  • What is the more vulnerable attack point — the device or the cloud services that support them?
  • What are the best practices for building a secure mobile application?
  • What have we learned from recent privacy breaches that can inform our own mobile security “hygiene?”
  • In the era of BYOD, how does enterprise IT deal with mobile security?

TO SUBMIT AN ARTICLE IDEA: Deadline 27 October 2014
Please respond to Sebastian Hassinger at shassinger[at]cutter[dot]com, with a copy to cgenerali[at]cutter[dot]com and include an extended abstract and a short article outline showing major discussion points.

ARTICLE DEADLINE: 24 November 2014

Editorial Guidelines


Christine Generali

Christine Generali is a Group Publisher for Cutter Consortium - responsible for the editorial direction and content management of Cutter's flagship publication, Cutter IT Journal.


 Leave a Reply

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>