Access "Apple security update: Is it ready for the enterprise?"
This article is part of the May 2013 / Volume 15 / No. 4 issue of Compliance and risk modeling
Apple, Inc.’s complex posture on security poses challenges for information security decision-makers charged with assessing the risks created by an influx of iPhones, iPads and Mac OS X devices. In the past year, security experts have proclaimed that Apple is simply not taking security as seriously as its major competitors. Apple’s security lags behind Microsoft Corp.’s by as much as 10 years, according to Kaspersky Lab CEO Eugene Kaspersky, who expressed concern in April 2012 about growing malware threats, after the company’s slow response to a critical Java update, made customers’ systems vulnerable to the Flashback Trojan. Apple has since been lauded for smart security decisions, such as eliminating the use of vulnerable Java versions on its devices, and adding support for two-step verification on Apple IDs in March 2013. Is Apple a model of solid security stewardship, or merely paying more attention to security to avoid backlash? Another criticism levied at Apple is its lack of transparency. The company is not upfront about malware threats and ... Access >>>
Premium Content for Free.
Editor’s desk: A chat with Peter G. Neumann
by Kathleen Richards
Peter G. Neumann shares his thoughts on the inherent complexity of trustworthiness and the evolutionary promise of clean-slate architectures.
Apple security update: Is it ready for the enterprise?
by Karen Scarfone
It’s hard to declare Apple security as superior to its competitors, but it’s also hard to fault it as inferior.
- Editor’s desk: A chat with Peter G. Neumann by Kathleen Richards
Reframing compliance with a threat model
by Tony UcedaVelez
Too many compliance programs miss the mark. Tony UcedaVelez explains how leveraging a threat model can re-energize your strategy.
Data breach protection requires new barriers
by Ernie Hayden, Contributor
Assumption of breach is the new norm. Can this shift help organizations build better levels of data breach protection?
- Reframing compliance with a threat model by Tony UcedaVelez
Marcus Ranum: Q&A with clean-slate pioneer Peter G. Neumann
by Marcus Ranum
Marcus Ranum, security expert and Information Security magazine columnist, goes one-on-one with clean-slate luminary Peter G. Neumann of SRI International and formerly Bell Labs.
IT security education climbs the corporate ladder
by Doug Jacobson and Julie A. Rursch
Managers need more training about technical security threats and input into IT policies that threaten productivity.
- Marcus Ranum: Q&A with clean-slate pioneer Peter G. Neumann by Marcus Ranum
More Premium Content Accessible For Free
Secure file transfer: Send large files fast, but keep your system safe
FTP gets big files to colleagues and clients fast, but as the headlines remind us, the threat of electronic break-ins is real. This guide to secure ...
Is your mobile security strategy combating the wrong enemy?
As tablets and smartphones become more integrated into business environments, CISOs are scrambling to put effective countermeasures in place. But too...
What's the best focus for MDM strategy now?
This Technical Guide examines the necessary elements of, and how to implement, a sound mobile device management strategy. Devices will be lost...