October 01, 2012
Most BYOD discussions focus on technical issues, such as how to identify offending devices, how to keep them off the network, or how to limit the types of devices. But nobody is talking about the human element.
October 01, 2012
In the age of mobile, social and cloud, the so-called perimeter that businesses have been protecting for years is now dead.
August 15, 2012
If there are two trends that have created a multitude of issues for security professionals, they're cloud services and bring-your-own-device. But there are ways to manage them.
August 01, 2012
Businesses may no longer be able to turn away employees who want to bring their smartphones and tablets to work, and connect to the corporate network. But is that actually a good thing?
August 01, 2012
Many of today's applications are designed to work over any port, which increases chances they won't be blocked by firewalls.
Many organizations are focusing their security efforts on deterring the external attack -- often at the expense of catching the insider threat. This could be a costly oversight, especially with the rise of BYOD.
June 27, 2012
This featured article is a sample of our "Mobile Spotlight" issue and discusses mobile apps in the enterprise and how employees downloading them is cause for concern for IT departments.
June 25, 2012
As security professionals try and grapple with one of the biggest challenges in the industry, the key to embracing a bring-your-own-device (BYOD) environment is clear visibility.
With a slew of threat vectors to cover, security professionals are faced with one of the biggest challenges in the industry to date: mobility in the workplace. In this video, the founder and president of Appthority discusses app management in the enterprise.
Dan Kaplan, executive editor of SC Magazine, sits with Yogen Edholm, CEO of Accellion Inc., to discuss mobility in the workplace in this insightful In Focus video.
Bring-your-own-device and cloud security are just some of the topics that add to the changing threat landscape of online security.
While progress against security threats has been made, attackers are targeting new vulnerabilities, such as those found in mobile devices, according to the annual IBM X-Force study.
Dell has announced it will buy SonicWALL, a California-based provider of unified threat management security software.
From issues that corporations face with mobile security, to social networking threats on sites like Pinterest, there were endless hot topics at this year's RSA Conference 2012 in San Francisco.
Stephen Cobb, security evangelist at ESET, discusses the hot topics at this year's RSA Conference 2012, including BYOD, attacks on social networks, and resource challenges in today's economy.
Tom Reilly, VP and general manager of HP Enterprise Security Products, discusses the issues facing the security industry today including targeted attacks, managing big data, and how bring-your-own-device also raises issues with mobile computing.
March 01, 2012
DLP solutions remain fairly immature, but the need to protect and monitor sensitive information is greater than ever.
March 01, 2012
The exploding use of smart mobile devices and the business productivity that accompanies this trend has many CIOs and IT administrators reeling.