It's critical that organizations looking to protect themselves from threats introduced via mobile devices look for a solution that identifies devices and applies access policies BEFORE allowing devices on the network.
IT departments with a block BYOD policy should be wary of these common workaround attempts or hacks.
Today's businesses are subject to more rigorous IT compliance and security requirements than ever before.
For those of us who have been pursuing an effective public-private threat sharing mechanism, there's hope that maybe this time a program will be developed that effectively accomplishes this task.
The mobile apps we download have access to an enormous amount of personal data. As we start using our phones and tablets for work, we're also putting corporate data at risk.
With breaches occurring now more than ever, organizations need to place a proper security strategy in place to not become the next victim.
Our relationship with our devices is deep, and getting deeper. But without access to data, the value of our devices is limited, if not eliminated.
We must accept the sophistication of the existing malware landscape and take a threat-centric approach.
We expect the threats in 2013 to be more exciting than last year based on the following top 10 security challenges identified by AT&T information security researchers and engineers.
In order to implement effective mobile security, security evangelists must balance risk and cost and speak the language of business.