When alien hardware invades: 4 keys to BYOD success
We all love our gadgets, but some of our favorite devices, however innocent they may appear, are poised to overwhelm IT departments worldwide.
Tony Bradley | 28 Feb | Read more
We all love our gadgets, but some of our favorite devices, however innocent they may appear, are poised to overwhelm IT departments worldwide.
Tony Bradley | 28 Feb | Read more
Mobile malware and narrowly-targeted attacks are steadily rising, according to a McAfee report released earlier this month. These ticking time bombs and other security threats should concern your small business.
Tony Bradley | 22 Feb | Read more
In a bid to give IT departments better control over devices that employees bring to work, ForeScout Technologies has added MobileIron to the list of mobile management vendors its network access control platform can be integrated with.
Mikael Ricknäs | 12 Feb | Read more
Aptly named, a company's help desk is primarily focused on resolving technology issues so the business as a whole can function successfully. Despite the best of intentions, however, help desks can put the company at risk by using legacy tools, shared passwords and incomplete security practices.
Bryan Hood, solution engineer for remote support software provider Bomgar | 08 Feb | Read more
Cisco has 60,000 Internet-connected devices in its BYOD program at the end of 2012 and just under 14,000 were iPads, the company says in its 2013 Annual Security Report.
With BYOD iPad security under control, financial services firm Blackstone looks toward tough challenges ahead, including the possibility of company-owned iPads and opening up its BYOD program to Android and Windows 8 devices.
Tom Kaneshige | 24 Jan | Read more
Federal agencies continue to struggle with the question of whether to allow employees to use their personal smartphones and tablets at work under so-called bring-your-own-device (BYOD) policies, according to a survey out this month from the organization Telework Exchange.
Ellen Messmer | 22 Jan | Read more
The greatest challenge for today’s security infrastructure and methods of protection is advanced malware attacks.
Patrick Budmar | 15 Jan | Read more
Gartner has said what it expects to be the top security trends for 2013, citing the rise of cloud computing, social media and employees bringing their own devices to work as among the forces likely to produce radical changes in how enterprises manage IT security. The market research firm also says the "major shift" expected in IT security in 2013 will shake up established IT security vendors as newer players in cloud and mobile challenge them.
Ellen Messmer | 03 Jan | Read more
With a growing number and type of devices, enterprises need to assume that they are vulnerable, analysts say
Taylor Armerding | 03 Jan | Read more
How smartphones and tablets are forcing CSOs to approach ID and access management differently
Bob Violino | 20 Dec | Read more
Healthcare is moving cautiously into cloud computing, virtualization, BYOD and other IT innovations. And there's good reason for the caution. Until an organization's IT leaders take meaningful steps to change what's typically seen as a lackadaisical privacy and security culture, the risk of patient-information loss remains high and costly.
Brian Eastwood | 19 Dec | Read more
Are your BYOD-embracing employees decommissioning their old mobile devices to ensure they can't still access your corporate networks?
David Braue | 19 Dec | Read more
What's in store for 2013? IT professionals need to be prepared for a mix of old (biometrics), new (3-D printing), borrowed (apps for watching TV) and blue (unemployed skeuomorphic designers).
John Brandon | 18 Dec | Read more
For all the advances in enterprise networking over the years there's been one big step backward: security testing. Relatively few enterprises today conduct regular security tests in-house, relying instead on occasional tests by outside consultants or, more dangerously, just taking vendor claims at face value.
Aswath Mohan, director of marketing, Spirent Communications | 12 Dec | Read more