January 18, 2013
There's no denying that CSOs will have to deal with bring-your-own-device sooner or later, but ultimately it will lead to an enhanced workforce.
November 01, 2012
The theater of risk has changed from network service-based attacks to attacks against the endpoint.
November 01, 2012
As device adoption continues to grow, the importance of implementing a secure enterprise mobility program cannot be understated.
November 01, 2012
No a business' size, employees are yearning to connect their personal devices to the corporate network. But fear not: Solutions and best practices are starting to emerge to manage the risk attached with this craze.
Security experts at SC Congress New York said that well-defined user guidelines set the stage for more efficient, less costly BYOD
October 08, 2012
Companies are permitting BYOD even if they have policies against it. But a set of best practices, covering areas such as IT inventory and device detection, can mitigate many of the corresponding risks.
October 01, 2012
Most BYOD discussions focus on technical issues, such as how to identify offending devices, how to keep them off the network, or how to limit the types of devices. But nobody is talking about the human element.
October 01, 2012
In the age of mobile, social and cloud, the so-called perimeter that businesses have been protecting for years is now dead.
September 18, 2012
One of the many challenges that industry professionals face today is categorizing data within their own network. But there are ways to minimize the headaches and still ensure security.
August 15, 2012
If there are two trends that have created a multitude of issues for security professionals, they're cloud services and bring-your-own-device. But there are ways to manage them.
August 01, 2012
Businesses may no longer be able to turn away employees who want to bring their smartphones and tablets to work, and connect to the corporate network. But is that actually a good thing?
August 01, 2012
Many of today's applications are designed to work over any port, which increases chances they won't be blocked by firewalls.
Many organizations are focusing their security efforts on deterring the external attack -- often at the expense of catching the insider threat. This could be a costly oversight, especially with the rise of BYOD.
June 25, 2012
As security professionals try and grapple with one of the biggest challenges in the industry, the key to embracing a bring-your-own-device (BYOD) environment is clear visibility.
With a slew of threat vectors to cover, security professionals are faced with one of the biggest challenges in the industry to date: mobility in the workplace. In this video, the founder and president of Appthority discusses app management in the enterprise.
June 12, 2012
With emerging technologies that must be controlled, the demand to align business risk with security is growing. As such, the IT role is being reinvented under our feet, and those who function more like a CIO will rule the world.
ActivIdentity's Julian Lovelock discusses challenges in the IT security world today with Dan Kaplan, executive editor of SC Magazine, in this insightful In Focus video.
June 01, 2012
Mobile security problems continue to vex many an IT security officer.
Experts at this year's SC Congress Canada in Toronto discussed the challenges of BYOD and how implementing policies may be the industry's biggest weapon.
May 01, 2012
There is increasing pressure to make corporate resources available to users on any device.
May 01, 2012
For a while, only traditional PCs were connected to the public internet. But with most devices now gaining networked capabilities, it's only a matter of time before your television can contract a virus.
Bring-your-own-device and cloud security are just some of the topics that add to the changing threat landscape of online security.
March 26, 2012
Bringing together two separate pieces of security research reveals vulnerability to cybercrime on an alarming scale.
March 22, 2012
Enterprises are being exposed to multiple operating systems, models and operators - requiring IT teams to support the safe deployment of personal devices used for work purposes.
From issues that corporations face with mobile security, to social networking threats on sites like Pinterest, there were endless hot topics at this year's RSA Conference 2012 in San Francisco.
March 01, 2012
The exploding use of smart mobile devices and the business productivity that accompanies this trend has many CIOs and IT administrators reeling.
Bring-your-own-device (BYOD) quickly made the jump from industry trend to business imperative, and organizations are now feeling the pressure to open their networks to employee-owned devices.
The threats associated with mobile devices can come in many forms, so there are a number of best practices one can put in place to thwart potentially disastrous consequences.
January 17, 2012
With BYOD, there's a confluence of people bringing in potential dangers from the outside that in turn presents a new class of security concerns that businesses haven't had to consider before.