You searched for mobile device management/ | SC Media

Your search for mobile device management/ returned 10 results

Your search for mobile device management/ returned 10 results

Sort Results:

Relevant Recent
Back to basics for enterprise defense

Back to basics for enterprise defense

Implementing proper security practices protects against today's and tomorrow's risks, says Vicki Ames, former information system security officer at a federal medical research agency .
Security News

Do you know where your data is?

As we are all aware, there has been a rash of reported privacy breaches recently. This likely is because not only is our enterprise data more transient and mobile, but we are having increasing difficulty controlling where that data goes and what controls, if any, go with that data. And that assumes that we actually know where our data is, and who is doing what with it. The sad truth: information security professionals often do not know the location of their enterprises' data.
Earl Porter

Merging security and privacy roles

The responsibilities of the chief security officer keep growing. Years ago, personnel in the position fulfilled a very technical role and didn't have to really interact with the suits. However, over the years the role has changed. Today the CSO is responsible for a variety of very technical programs, such as intrusion detection, as well as some very non-technical programs, such as business continuity planning (BCP).
Next post in Opinions