Spend an hour with mobile security pioneer Malcolm Harkins, chief security and privacy officer at Intel, as he answers direct questions from attendees about how to get the most from your mobile security efforts.
Attendees had the opportunity to submit questions directly to Harkins. Among the topics he...
The consumerization of IT and the popularity of BYOD are jeopardizing the security and integrity of enterprise data. Seeking an easy way to share files across smart phones, tablets, and desktops, employees are using free public cloud file sharing services that lack rigorous security and audit controls. These services...
The proliferation of mobile devices and IT management's increasing acceptance of BYOD are creating new security challenges for enterprises. Employees are using personal devices such as iPads and Android phones to access and store business data. To share this data, they're relying on e-mail and consumer-grade file...
Mobile computing is a powerful, easy-to-use technology that delivers impressive benefits in productivity and agility, that employees are eager to adopt. But along with the impressive benefits come substantial risks, especially related to data security. These risks include new forms of malware that target mobile...
To stay productive, mobile workers want access to the same data they have in the office - including data stored in Enterprise Content Management (ECM) systems such as Microsoft® SharePoint.
When users discover that SharePoint data can't be accessed easily on tablets and smartphones, they often work around...
At a time of unprecedented mobile device adoption - and evolving mobile security threats - 72% of organizations rate their state of mobile security as poor-to-adequate. This is the key point to emerge from the results of the Beyond BYOD: 2013 Mobile Security Strategies Survey, produced by Information Security Media...
Mobile device management and application security are just two aspects to consider. What about network security? Dave Jevans of Marble Security discusses a three-tiered approach to mobile security.
At the outset of the BYOD trend, mobile security was about protecting devices. Today, mature organizations are focused more on protecting data and ensuring proper identity and access management.
In this exclusive session, a sequel to Mobile: Learn from Intel's CISO on Securing Employee-Owned Devices, Malcolm...
DDoS attacks, mobile malware and tax fraud are growing concerns for U.S. banks. But what's the top threat these institutions and their customers face in 2013? Nancy Guglielmo of BITS offers her insights.
Solutionary is out with its 2013 Global Threat Intelligence Report. What are the top four threats to organizations, and how can they be mitigated? Security strategist Don Gray offers insights and tips.
Malware, DDoS and mobile security aside, one of the biggest risks is organizations' lack of visibility into specific threats. Don Gray of Solutionary explains the need for actionable threat intelligence.
It's not malware, crime rings or hacktivists. What, then, are among the threats that concern security leaders most? CISO Tom Newton offers new insight on today's top threats and strategies to combat them.
ENISA, the European Union cyber-agency, is out with its first-ever Threat Landscape report. What are the emerging threats and vulnerabilities, and how should organizations globally respond to them?
To mitigate the top threats for 2013, organizations need to understand the motivations of potential attackers so they can adequately defend their networks and systems. Experts describe risk management strategies for the year ahead.
On the same day Citi's online and mobile-banking channels went down for undisclosed reasons, Homeland Security Secretary Janet Napolitano said top U.S. banks are "actively under attack."
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ddos.inforisktoday.com, you agree to our use of cookies.