Intelligence & Analytics November 7, 2014 Identity Management in the Brave New World of Social, Mobile and the Cloud 2 min read - The modern identity management ecosystem must be properly managed as companies increasingly adopt the cloud to access secure data.
CISO November 3, 2014 Remote Wiping of Mobile Devices and Implications for Incident Response 3 min read - Lessons learned for incident response from criminals remotely wiping mobile devices seized by U.K. police.
October 6, 2014 US Cybercrime Survey Says Companies Missing the Mark 2 min read - According to a recent cybercrime survey, companies need to improve their security policies to properly detect and mitigate potential risks.
Endpoint September 19, 2014 Bring Your Own Device: The Enterprise IT Challenge That Isn’t Going Away 2 min read - The bring your own device (BYOD) trend is probably here to stay, which means companies will need to secure their entire software stack, not just endpoint.
Endpoint September 15, 2014 A Case for Securing BYOD by Extending Identity Management 5 min read - When it comes to BYOD, organizations must protect their enterprise mobile apps with mobile device management and identity management solutions.
August 12, 2014 Multifactor Authentication Market to Be Worth $10 Billion by 2017 — But Is the Model All Wrong? 3 min read - The global multifactor authentication market is predicted to hit $10 billion by 2017; but are current methodologies ahead of the curve or behind?
Endpoint August 6, 2014 The New BYOD: Breach-Your-Own-Data? 3 min read - Does the new BYOD landscape point to an evolution of the acronym? Are companies facing a troubling future of breach-your-own-data?
Endpoint July 21, 2014 Is Password Protection Really Enough? 3 min read - Bring-your-own-device (BYOD) is an unstoppable force, but organizations need to take a close look at security and move beyond mere password protection.
CISO July 17, 2014 IT Systems and Security: Building Networks of Trust 2 min read - Business, like all of social life, depends on networks of trust, and the great challenge for IT systems is building those networks.
Endpoint July 16, 2014 State of BYOD and Mobile Security Report: Latest Insights, Trends and Stats 3 min read - The Information Security LinkedIn group has just release a new survey of its community on the state of bring-your-own-device (BYOD) initiatives.