Issue OverviewInformation Security magazine - April 2014 Vol. 16 / No. 3
As tablets and smartphones become more integrated into business environments, CISOs are scrambling to put effective countermeasures in place. But too often, their efforts are focused on combating malware instead of vulnerable applications, advanced adversaries and other emerging threats.
In this issue, we explore new mobile threats and outline steps to help security professionals hone their mobile security strategy, as organizations seek to empower their mobile workforce without compromising security. We also take a look at network programmability and Cisco Systems' Application Centric Infrastructure versus current software-defined networking implementations. Finally, analyst Jon Oltsik covers the ongoing transition in the endpoint security market as organizations face a threat landscape that requires layered security technologies. Access >>>
Premium Content for Free.
Beyond the Page: Strategies for a secure mobile device program
by Andrew Hoog, contributor
This Beyond the Page focuses on how mobile application management can help CISOs move beyond consumer-oriented endpoints and their security tradeoffs.
Endpoint security software market retools
by Jon Oltsik
Organizations face a dangerous threat landscape that demands new endpoint security controls and oversight.
- Beyond the Page: Strategies for a secure mobile device program by Andrew Hoog, contributor
Mobile security: The battle beyond malware
by Andrew Hoog
Combating the wrong enemy? Evolving threats and new attack surfaces demand your mobile security strategy keep pace.
How Cisco's 'Application Centric Infrastructure' differs from SDN
by Sally Johnson, Contributor
As Cisco rolls out a hardware-based alternative to software-defined networking approaches, what does it all mean for security?
- Mobile security: The battle beyond malware by Andrew Hoog
Data encryption, notification and the NIST Cybersecurity Framework
by Kathleen Richards, features editor
Awkward? The NIST Cybersecurity Framework arrives as the U.S. government struggles to counter negative reports on its data privacy and encryption standards.
Marcus Ranum and Anton Chuvakin explore big data and security
by Marcus Ranum
When will big data technologies move past the hype and help security teams?
Women in cybersecurity: The time is now
by Eric B. Parizo, Executive Editor
With the field in urgent need of practitioners, the chief of a new cybersecurity program at a small women's college believes he can make a difference.
- Data encryption, notification and the NIST Cybersecurity Framework by Kathleen Richards, features editor
More Premium Content Accessible For Free
Strategies for a successful data protection program
Deploying data protection technologies properly requires a lot of time and patience. While most firms can get started by using preconfigured policies...
Devices, data and how enterprise mobile management reconciles the two
The bring your own device (BYOD) movement, which has flooded the enterprise with employee-owned smartphones, tablets, phablets and purse-sized ...
Putting security on auto-pilot: What works, what doesn't
For so long penetration testing meant hiring an expert to use skill and savvy to try to infiltrate the company system. But, as with most ...