dcsimg

New Mobile Security Spec Is Step to Tackle Threat Head-On

Carl Weinschenk

The Trusted Computer Group reportedly will use the CTIA Wireless IT and Entertainment show this month to introduce a spec designed to increase the security of mobile devices.

 

The heart of the Mobile Security Specification is a mobile terminal module (MTM) that guards data, applications and operating systems. (Everything in this post is predicated on a CSOonline.com report, since the group's Web site doesn't say anything about a launch.) The organization has created similar security infrastructures for PCs, servers and networks.

 

Of course, we think this is a great idea.

 

The moment of truth is fast approaching for mobile security. Attacks against devices are increasing gradually, but haven't yet reached the breaking point. If that point is breached, all subsequent efforts will focus on undoing damage.

 

A look back at the initial waves of spam, viruses and other problems suggests that a lot of headaches would have been averted if the industry had intensely focused on these problems as soon as they emerged. Management and IT need to learn from the past and dedicate themselves to keeping mobile security problems from spiraling out of control. As the saying sort of goes, a bit of prevention is worth a byte of cure.


 

The TCG's MTM seems like a good step in that effort. The basic idea of an area in a device that can be reinforced certainly makes a lot of sense. We're not engineers, so we can't say how the basic approach will translate from PCs and servers to the more constrained world of mobile devices in which power, memory and storage are in shorter supply.


Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

By submitting your information, you agree that itbusinessedge.com may send you ITBbusinessEdge offers via email, phone and text message, as well as email offers about other products and services that ITBbusinessEdge believes may be of interest to you. ITBbusinessEdge will process your information in accordance with the Quinstreet Privacy Policy.




Add Comment      Leave a comment on this blog post

Post a comment

 

 

 

 


(Maximum characters: 1200). You have 1200 characters left.

 

null
null

 

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

By submitting your information, you agree that itbusinessedge.com may send you ITBbusinessEdge offers via email, phone and text message, as well as email offers about other products and services that ITBbusinessEdge believes may be of interest to you. ITBbusinessEdge will process your information in accordance with the Quinstreet Privacy Policy.

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

By submitting your information, you agree that itbusinessedge.com may send you ITBbusinessEdge offers via email, phone and text message, as well as email offers about other products and services that ITBbusinessEdge believes may be of interest to you. ITBbusinessEdge will process your information in accordance with the Quinstreet Privacy Policy.


×
We have made updates to our Privacy Policy to reflect the implementation of the General Data Protection Regulation.