Issue OverviewInformation Security magazine - May 2012
Access this month’s issue to uncover strategies for taming the bring-your-own-device (BYOD) tide. In addition, explore other featured topics including VMware’s security partner program revamp, four keys to data loss prevention (DLP) success, top considerations for information security career recruitment and more. Access >>>
Premium Content for Free.
Mobile device management systems help mitigate BYOD risks
by Lisa Phifer, Contributor
Understand the benefits and limitations of multi-platform MDM technology.
Deploying DP systems: Four DLP best practices for success
by Crystal Bedell
Plan your data loss prevention project carefully to avoid missteps.
- Mobile device management systems help mitigate BYOD risks by Lisa Phifer, Contributor
VMware strategy for security partners undergoes overhaul
by Marcia Savage
Virtualization giant revamps its security partner program after hitting some bumps in the road.
Thwarting BYOD risks starts with a mobile security policy, experts say
by Robert Westervelt
Organizations need to establish formal mobile policies before buying a mobile device management system.
- VMware strategy for security partners undergoes overhaul by Marcia Savage
Verizon DBIR: Organizations are forgetting computer security basics
by Marcia Savage
Verizon data breach report illustrates need to get back to basics.
Cybersecurity education vs. cybersecurity training
by Ron Woerner, Contributor
Security professionals need to understand the difference and plan accordingly.
Security staffing: Why information security positions go unfilled
by Lee Kushner, Contributor
Be aware of potential roadblocks and adjust your recruiting accordingly.
- Verizon DBIR: Organizations are forgetting computer security basics by Marcia Savage
More Premium Content Accessible For Free
Strategies for a successful data protection program
Deploying data protection technologies properly requires a lot of time and patience. While most firms can get started by using preconfigured policies...
Devices, data and how enterprise mobile management reconciles the two
The bring your own device (BYOD) movement, which has flooded the enterprise with employee-owned smartphones, tablets, phablets and purse-sized ...
Putting security on auto-pilot: What works, what doesn't
For so long penetration testing meant hiring an expert to use skill and savvy to try to infiltrate the company system. But, as with most ...