by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
GCN : July 2013
10 GCN JULY 2013 • GCN.COM [BrieFing] COLLABORATION SOLUTIONS TRANSFORMING GOVERNMENT AGENCIES FIND A LOT TO LIKE IN COLLABORATION TOOLS COLLABORATION: A BROADENING OF HORIZONS BUDGET CUTS DRIVE SURGE IN WEBCASTS SUCCESSFUL COLLABORATIONS REQUIRE MORE THAN GOOD TOOLS AGENCIES INVEST IN FUTURE OF COLLABORATION TOPICS INCLUDE: Sponsored by Adobe TO LEARN MORE, VISIT: GCN.COM/2013COLLABSOLUTIONS RESEARCH REPORT Newly revised guidance for securely managing mobile devices sharpens the focus of the original NIST publication, released in 2008, excluding laptops and low-end cell phones and address- ing both enterprise-issued and privately owned devices. The National Institute of Technology's Special Publication 800-124, Revision 1, Guidelines for Managing the Security of Mobile Devices in the Enterprise, explains the security concerns inher- ent in mobile device use and provides recommendations for selecting, imple- menting and using centralized manage- ment technologies to address these risks throughout the device life cycles. The original version of the publication was titled "Guidelines on Cell Phone and PDA Security," and the change in titles re ects shifts in the technology environ- ment over the past ve years. Most cell phones now are mobile computers with Internet connections, capable of access- ing, storing and processing data. Tablets have emerged as a new category, and the use of personal devices within the enterprise has become a fact of life, to the point where the abbreviation BYOD seldom needs an explanation. Assuring the con dentiality, integ- rity and availability of data on a mobile device, as well as the security of the enterprise it connects to, requires the same level of security required for desk- tops and laptops, as well as additional protection for threats speci c to mobile and wireless devices that often are not operating within the enterprise. The revised SP 800-24 contains speci c recommendations for securing mobile devices, intended to supple- ment more general IT security controls speci ed in the latest revision of NIST's SP 800-53, Recommended Security Controls for Federal Information Systems and Organizations. Risks speci c to, or greater for, mobile NIST: Assume a mobile device will fall into malicious hands BY WILLIAM JACKSON