by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
GCN : January 2013
GCN JANUARY 2013 • GCN.COM 7 SPONSORED BY VERIZON WIRELESS TOPICS INCLUDE: MOBILITY MANAGEMENT: THE BIGGER THE BETTER BYOD: IT'S MORE COMPLICATED THAN YOU MIGHT THINK MOBILE APPS: THE RACE IS ON MOBILE SECURITY: INNOVATION IS IN THE WORKS 4 BEST PRACTICES FOR MANAGING THE MOBILE OFFICE TO LEARN MORE, VISIT: GCN.COM/MOBILEOFFICE mobile office Special Report SCAN THIS QR CODE with your smartphone for the full research report of backdoors, it can help protect against bugs that create vul- nerabilities and provide criteria for selecting trusted vendors. The National Institute of Standards and Technology has weighed in with advice on managing supply chain risk for fed- eral information systems in an interagency report published in October. Among its recommedations: • Uniquely identify supply chain elements, processes, and ac- tors. • Limit access and exposure within the supply chain. • Establish and maintain the provenance of elements, process- es, tools, and data. • Limit the sharing of information. • Perform risk management awareness and training. COLLATERAL DAMAGE, CYBER WAR, ESPIONAGE Cyberwar and state-sponsored espionage emerged several years ago as concerns, but state-sanctioned use of cyber weapons such as the Stuxnet family of software might be just the tip of the threat iceberg. "Con icts in modernized areas will use cyber warfare to a varying extent, often involving malware," Snorre Fagerland, principal security researcher in the Norman Malware Detec- tion Team predicted. "Those without the money, skill or time to develop their own will use off-the-shelf tools." But Microsoft blogger Tim Rains warns that the process will work the other direction as well, with criminals bene tting from cyber war and espionage. "It's a safe bet that there have been some unintended consequences that we will continue to see in 2013 and beyond," he wrote. Malicious code is notoriously dif cult to control once it has been released into the wild, and the well-funded efforts of na- tions to develop sophisticated weapons could go to subsidize cyber criminals, Rains warns. WINDOWS 8 Microsoft's latest operating system re ects the company's efforts at secure software development and does a good job of security. But it isn't perfect and it is a high-pro le, high-value target. Windows 8 is a signi cant redesign with a much different look and feel that will cause many enterprises to be cautious in transitioning. But with XP approaching its end of life and the failure of Vista to gain popular support, we can expect to see Win8 being widely adopted in coming years. This, and the fact that it will provide a uniform platform for a wider variety of devices, will make it an attractive target for evil doers. With enough researchers hammering away at it, they will nd signi - cant vulnerabilities to be exploited. •