Access "BYOD security strategies: Balancing BYOD risks and rewards"
Mobile devices come in all shapes and sizes, from smartphones, notebooks and tablets, to the new-breed hybrid convertibles and detatchables that made headlines at the Consumer Electronics Show 2013. While mobility boosts enterprise employee efficiency by delivering "anywhere access" to business data and systems, it obliterates what's left of the increasingly ineffective corporate network perimeter. Many security managers have already discovered the disconcerting implications: less control than ever over enterprise data access from a myriad of consumer devices—including a groundswell of bring your own devices (BYODs)—and more difficulty determining which devices are accessing which systems and data. So it's no surprise that as use of personal mobile devices grows and becomes pervasive inside and outside the office, employers are struggling to enable secure use of BYODs. Anthony Peters, director of information technology at Burr Pilger Mayer Inc., a 400-strong financial services firm headquartered in San Francisco, said his tidy, policy-driven corporate ... Access >>>
Premium Content for Free.
The Huawei security risk: Factors to consider before buying Chinese IT
by Joel Snyder, Contributor
Cover story: The U.S. government says Chinese IT giants Huawei and ZTE pose too much risk. But do they? Joel Snyder offers his take.
BYOD security strategies: Balancing BYOD risks and rewards
by Lisa Phifer, Contributor
Allowing employee-owned mobile devices doesn’t have to mean accepting all BYOD risks. Infosec pros share their BYOD security strategies.
- The Huawei security risk: Factors to consider before buying Chinese IT by Joel Snyder, Contributor
IT Security Trends 2013: Mobile security concerns tops the list
by Robert Richardson
- IT Security Trends 2013: Mobile security concerns tops the list by Robert Richardson
Offensive security involves proactive deception tactics
by Robert Westervelt
Going on the offense doesn’t mean actively targeting cybercriminals, experts say. Deceptive tactics, phony documents can help trip up attackers.
- Offensive security involves proactive deception tactics by Robert Westervelt
2013 Security Priority Survey, security risks when buying IT hardware from China
by Robert Richardson, Editorial Director
Information Security Magazine reveals the results of its 2013 Security Priority Survey and examines the security risks associated with purchasing IT hardware from China. Elsewhere in the issue, infosec pros share their strategies for BYOD security.
Information assurance training programs create new cadre of IT security pros
by Doug Jacobson and Julie A. Rursch
University information assurance programs are varied, but they are beginning to provide technology disciplines a level of security knowledge.
Testing, assessment methods offer third-party software security assurance
by Gary McGraw, Contributor
No ultimate test can give third-party software a clean bill of health, but careful assessment can help organizations gain more control over vendors.
- 2013 Security Priority Survey, security risks when buying IT hardware from China by Robert Richardson, Editorial Director
More Premium Content Accessible For Free
Threat intelligence and risk: Why cybersecurity hangs in the balance
As more security professionals take on greater roles in global risk management, Global 2000 companies are investing in cybersecurity measures above ...
How to respond to the latest distributed denial-of-service attacks
All indications show that DDoS attacks are increasing in variety, number and size. No network system is immune and information security pros can't ...
Figuring out FIDO as the first products emerge
The Fast Identity Online (FIDO) standards reached the public draft stage in February, and the first deployments of FIDO-ready technologies followed ...