Access "Mobile device protection: Tackling mobile device security risks"
This article is part of the January/February 2012 issue of Combat the latest malware threats with effective antimalware planning
Like many organizations, the city of Seattle is devising a strategy for mobile devices. City officials are figuring out which mobile operating systems they’ll support, whether to allow employees to use their own phones and they’re testing mobile device management technology. Ultimately, managing an influx of mobile devices requires a much different security strategy than the traditional desktop model of antivirus and other endpoint controls, says Mike Hamilton, Seattle’s CISO. “Computing is becoming extremely ubiquitous. As a result, there is no perimeter anymore,” he says. “So 20th century controls aren’t going to work in this environment.” The deluge of iPhones, iPads and Android devices into the enterprise has put mobile device security risks at the top of the agenda for many organizations. According to Information Security and SearchSecurity.com’s 2012 Priorities survey, 72 percent of 900 respondents cite mobile device protection as a priority this year. Nearly 35 percent view mobile device security as a major challenge with encryption topping the list ... Access >>>
Premium Content for Free.
New malware threats require new antimalware protection strategy
by Lisa Phifer
Attackers are targeting new vectors such as smartphones, social media and cloud services. Enterprises need to up their game.
Tackling SSL vulnerabilities for secure online transactions
by Michael Cobb, Application Security
A rash of CA breaches shows up weaknesses in the SSL infrastructure. Take action to protect your customers and employees.
- New malware threats require new antimalware protection strategy by Lisa Phifer
Mobile device protection: Tackling mobile device security risks
by Marcia Savage, Editor
Managing mobile device risks tops the list of priorities for security pros this year.
SOPA and PIPA pirating laws lose support in face of opposition
by Robert Westervelt, News Director
Security experts say there are better alternatives to copyright protection.
- Mobile device protection: Tackling mobile device security risks by Marcia Savage, Editor
Can a computer security researcher go too far?
by Elizabeth Martin
An examination of three cases illustrates that it’s not always a clear case of good vs. evil.
Ranum chat: APT attacks and malware evolution
by Marcus Ranum
Security expert Marcus Ranum talks with Joel Yonts, a seasoned security executive with a passion for information security research.
Security leaders help squash SOPA, PIPA pirating laws
by Michael S. Mimoso, Editorial Director
Prominent security and Internet thinkers and leaders have become an effective lobby on Capitol Hill and played a big role in squashing SOPA.
- Can a computer security researcher go too far? by Elizabeth Martin
More Premium Content Accessible For Free
You can fight compliance or embrace it, but one way or the other, you can’t escape it. Increasingly, smart organizations are not just accepting ...
Antivirus and intrusion prevention aren’t the threat detection stalwarts they used to be. With mobile endpoints and new attack dynamics, enterprises ...
The world in which successful IAM programs must be implemented is increasingly complex, a mix of legacy on-premise IAM infrastructures, cloud-based ...