You searched for mobile device management/ | SC Media

Your search for mobile device management/ returned 10 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Last 2 years remove
Evan Schuman remove

Your search for mobile device management/ returned 10 results

Sort Results:

Relevant Recent
Editorial, Mobile Security, SC Security Ops Center, Security News

Handcuffing the mobile octopus

MDM strategies: An embarrassment of niches It is Christmas Day at 2 a.m. and a new mobile device just connected to your network. Your servers are configured to send a text message to alert you when new devices connect, so you immediately know that something has happened. But you have no policy that requires that…
Features, Security News

Rethinking cyber risk

Everyone agrees that risk is essential. They just have different versions of what risk is, Evan Schuman reports. It’s time to rethink risk – both how to operationalize it and how to define it. With all the incompatible views of risk from different stakeholders through an enterprise, it’s hardly surprising that so many organizations struggle…
IoT, Privacy & Compliance News and Analysis, Security News

Are your fleet’s vehicles leaking your data secrets?

Enterprise CISOs are used to worrying about corporate data leaks via typical mobile, remote locations, IoT and Shadow IT. But what about the vehicles used by so many people who have access to the systems and data you are paid to protect? Although those vehicles technically fall into many of those categories (mobile, remote and…
SC Security Ops Center, Security News

The picture of threat intelligence

The long-acknowledged core problem with threat intelligence today is the software equivalent of a Yin and Yang situation. The algorithms are smart enough to catch a massive number of log anomalies, detecting any pattern deviation that might indicate an attack attempt. That said, they are not yet smart enough to identify accurately the real threats…
Features, Security News

Where enterprise CISOs go wrong

The best laid plans are often fraught with mistakes – some big, some more nuanced. Evan Schuman looks at where CISOs can fall short. Enterprise security today, at least at the $4 billion annual revenue level and up, is in a precarious place. Despite GDPR and best security practices insisting on having complete global datamaps,…
SC Security Ops Center, Security News

Rolling the Dice on AI

Man vs machine: The future of AI Fear of successful cyberattacks meets fear of unintended consequences when machine learning is your first line of defense. Evan Schuman reports. Fear can be a great motivator. If you are afraid that a human cannot make a decision fast enough to stop a cyberattack, you might opt for…
Home, SC Security Ops Center, Security News

SIEMple evolution: The future for a cloud-based SIEM

The future of SIEM is cloudy, literally and figuratively, as companies strive to keep up with potentially billions of events. It has become an industry cliché to say that SIEM (security information and event management) is dead. Some SIEM vendors love those pronouncements because it drives wavering customers to make purchases before their SIEM systems…
Home, SC Security Ops Center, Security News

SIEMple evolution: The future for a cloud-based SIEM

The future of SIEM is cloudy, literally and figuratively, as companies strive to keep up with potentially billions of events. It has become an industry cliché to say that SIEM (security information and event management) is dead. Some SIEM vendors love those pronouncements because it drives wavering customers to make purchases before their SIEM systems…
Privacy & Compliance News and Analysis, SC Security Ops Center, Security News

The three-sphere circus of compliance

When wrestling with compliance requirements, CISOs often feel like they are a performer in the middle of a three-ring circus, rapidly trying to juggle sharp knives. No matter how fast or perfectly they juggle, there is an assistant, or in this case regulator, behind the curtain constantly throwing out more and more knives, each one…
Ransomware, SC Security Ops Center, Security News

Going down the ransomware rabbithole

Looking for insights in modern literature to address the challenges facing CISOs might seem farfetched, but there is some logic to this. Lewis Carroll’s Alice’s Adventures in Wonderland and Through the Looking Glass illustrates the challenges posed by ransomware. While this might seem contradictory on the surface, the options and twisted logic Alice faced are…
Next post in Security News