IT departments with a block BYOD policy should be wary of these common workaround attempts or hacks.
Today's businesses are subject to more rigorous IT compliance and security requirements than ever before.
For those of us who have been pursuing an effective public-private threat sharing mechanism, there's hope that maybe this time a program will be developed that effectively accomplishes this task.
The mobile apps we download have access to an enormous amount of personal data. As we start using our phones and tablets for work, we're also putting corporate data at risk.
With breaches occurring now more than ever, organizations need to place a proper security strategy in place to not become the next victim.
Our relationship with our devices is deep, and getting deeper. But without access to data, the value of our devices is limited, if not eliminated.
We must accept the sophistication of the existing malware landscape and take a threat-centric approach.
We expect the threats in 2013 to be more exciting than last year based on the following top 10 security challenges identified by AT&T information security researchers and engineers.
In order to implement effective mobile security, security evangelists must balance risk and cost and speak the language of business.
I was surprised when one of our new employees several months ago described how a state agency enabled IT support personnel to easily maintain an after-hours "on call" list.