Print Issue: February 01, 2013
Despite the ubiquity of the Trusted Platform Module, holdups exist and adoption remains slow. Among them are issues with interoperability, considering Apple, Google and Microsoft all use different standards.
Results from our sixth-annual data breach survey are out next month, but here’s a sampling of what’s to come from our study of budgets, hiring practices, security solutions and more.
PayPal’s Andy Steingruebl knows security is not an insular task. By looking outside of its own walls, the company has taken the fight to the enemy, and helped everyone else in the process.
The United States has established itself as a major force in a new era of combat, but what repercussions do state-sponsored actions in cyber space have on all of us?
This month’s debate covers Hacktivist group Anonymous. Will they take a backseat to more extremist groups in 2013?
The NBA’s New Orleans Hornets needed to provide its off-the-court, but highly mobile staff with a secure method for communicating. It found an enterprise remote access solution that could help.
IE exploits, a zero-day vulnerability that affects various Internet Explorer versions, are February’s “Threat of the month.”
I was dismayed and disturbed by the suicide of Aaron Swartz, which only added to well-rooted revulsion for the relentlessness of legal actions against him.
The secret behind the MetaFlows Security System (MSS) is that it really is a hybrid application.
A more substantial enterprise mobility framework can be conceived with a combination of NAC, MDM and MAM based on organizational requirements.
Next post in Opinions