BYOD at the NSA? Maybe someday with mobile hardware root of trust

BYOD at the NSA? Maybe someday with mobile hardware root of trust

BYOD at the NSA? Maybe someday with mobile hardware root of trust

Date: Mar 11, 2013

SAN FRANCISCO -- Could BYOD ever be a reality for mobile device users at the National Security Agency?

"I never like to say anything's outside of the realm of possibility," said Troy Lange, NSA mobility mission manager, "but there are some significant challenges involved with being able to bring a mobile device inside a secure facility."

In this video, recorded at the 2013 RSA Conference, Lange discusses the key mobile security issues that must be resolved before bring your own device (BYOD) could happen at the NSA. Lange also discusses promising mobile security technologies, including mobile hardware root of trust and Suite B Cryptography algorithms, as well as why he hopes enterprises will throw their support behind NIST publication 800-164, a standard that outlines how to create application programming interfaces for mobile device management policy enforcement engines.

More on Handheld and Mobile Device Security Best Practices

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: