The perils of blocking BYOD

IT departments with a block BYOD policy should be wary of these common workaround attempts or hacks.

Achieving compliance in today's ever-changing enterprise network

Today's businesses are subject to more rigorous IT compliance and security requirements than ever before.

We're not in Kansas anymore!

For those of us who have been pursuing an effective public-private threat sharing mechanism, there's hope that maybe this time a program will be developed that effectively accomplishes this task.

BYOD's next challenge? Mobile apps collect user data

The mobile apps we download have access to an enormous amount of personal data. As we start using our phones and tablets for work, we're also putting corporate data at risk.

Cyber attacks: The easy recipe to becoming a victim

With breaches occurring now more than ever, organizations need to place a proper security strategy in place to not become the next victim.

Connect the dots: Secure everything, everywhere... and that includes performance and productivity

Our relationship with our devices is deep, and getting deeper. But without access to data, the value of our devices is limited, if not eliminated.

Threat-centric security: Before, during and after an attack

We must accept the sophistication of the existing malware landscape and take a threat-centric approach.

Top 10 security challenges for 2013

We expect the threats in 2013 to be more exciting than last year based on the following top 10 security challenges identified by AT&T information security researchers and engineers.

Easy math: the mobile security payoff

In order to implement effective mobile security, security evangelists must balance risk and cost and speak the language of business.

Identity crisis: From the data center into the cloud

I was surprised when one of our new employees several months ago described how a state agency enabled IT support personnel to easily maintain an after-hours "on call" list.

Sign up for our newsletters

POLL