Snapshot: Enabling a Secure Mobile Ecosystem
Protecting mobile devices from cyber-attacks and accelerating the adoption of secure mobility for the federal government is a critical research focus of the Department of Homeland Security DHS S&T.
An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock
()
or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Protecting mobile devices from cyber-attacks and accelerating the adoption of secure mobility for the federal government is a critical research focus of the Department of Homeland Security DHS S&T.
DHS S&T, along with BlueRISC, Inc., is developing a new Cloud-based Root-of-Trust (CRoT) technology called EPRIVO Enterprise 2.0 to address mobile device email security and privacy.
DHS CISA and S&T will jointly showcase their cybersecurity capabilities and technology solutions at Mobile World Congress Los Angeles 2019 next week.
A new study released today by DHS S&T describes a continuous approach to mobile app vetting that integrates the capabilities of enterprise mobility management (EMM) solutions with app vetting tools to improve the security of mobile devices.
This S&T study recommends federal agencies adopt a continuous approach to standards-based mobile app vetting by integrating vetting tools with EMM and exploring nontraditional approaches, such as app threat intelligence. These approaches would improve overall federal system mobile device and enterprise security while also enabling employees to use apps to conduct business and accomplish their organization’s mission.
CISA and S&T are seeking development of new standards to improve the security and resilience of critical mobile communications networks through a new BAA Solicitation 70RSAT19RB00000001.
DHS S&T is working to increase mobile app security by developing innovative solutions that will extend beyond deployment of an app to provide continuous security assurance throughout an app’s lifecycle.
Mandated by the Cybersecurity Act of 2015, the “Study on Mobile Device Security” relied on significant input from mobile industry vendors, carriers, service providers and academic researchers.
Mobile Security R&D Program Guide, Volume 3