Today’s Chief Information Security Officers (CISOs) are asking themselves, “How can we benefit from mobile and cloud technology – securely?” Risk and Security Officers are often placed in the role of public defender for corporations. They are charged with proactively protecting the enterprise from a variety of cyber threats while the business continues to evolve. This broad responsibility becomes even more challenging when companies adopt new technology without a security strategy.
IBM has announced our intent to acquire Fiberlink. Fiberlink’s MaaS360 enterprise mobility management (EAM) platform delivers leading mobile management and security capabilities from the cloud. Mobile management, when taken in combination with mobile application security, mobile access and trusted mobile transactions highlights the tremendous opportunity around the security of mobile devices.
Data privacy has been a hot topic. Consumers want everyone to follow them on Twitter, Facebook and Instagram. But when it comes to being tracked and having your personal data and private shopping habits used, consumers are not so excited about being followed.
Passwords are failing us. Roughly 76% of all data breaches were enabled by weak credentialing and user authentication. It’s time to discuss replacing them with something that does work.
The momentum of public cloud adoption and mobile computing as a business platform are forcing us to review our data management strategies before sending our data out into the void.
Four basic steps to implementing data security in the Cloud. As technology enables new insights into business it becomes even more important to protect the data that is in the Cloud or in the IT infrastructure.
With Blackhat USA behind us and Defcon in its full throes, there seems to be a trend away from purely digital hacks and toward physical devices. In that spirit, here are nineteen amazing hacks that cross the physical divide.
No company wants to buy or create insecure software. But in daily practice, requirements like a “slick” UI or being first to market, usually win out over security. So the question is… Are we doing it wrong?
Need to convey how enterprise data is at risk from malware that infects the mobile devices of their users. The malware mines for user and enterprise data on the mobile device. If enterprise mobile applications are insecure not protected data is at risk.
NFC or Near Field Communication is a standard that defines the exchange of data between two devices in close proximity. For NFC enabled smartphones, that means consumers can replace their credit and debit cards with an electronic wallet. So how vulnerable is the technology?