Access your Pro+ Content below.
BYOD means creating a new security game plan in the enterprise
This month's Information Security magazine online cover story highlights the importance for an updated security game plan due to the influx of personal smartphones and other computing devices making their way into the enterprise. Also, learn how to focus your SIM solution to avoid information overload and explore FISMA challenges.
Access this PRO+ Content for Free!
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Features in this issue
In order to get the best results, you need to limit your goals for SIM.
The influx of personal smartphones and other computing devices into the enterprise is forcing a shift in security strategy.
An automated tool and mandates for continuous monitoring try to improve federal information security efforts.
Sony and other data breaches suggest need for data accountability, better configuration management.
Columns in this issue
Online criminals have smaller targets firmly in their crosshairs.
Banks and other businesses are rushing to jump on the mobility trend but leaving security behind.
Security expert and Information Security magazine columnist Marcus Ranum continues a new bimonthly feature where he goes one-on-one with a fellow security industry insider.