Access your Pro+ Content below.
IT Security Trends 2013: Mobile security concerns tops the list
This article is part of the February 2013/ Volume 15 / No. 1 issue of Information Security magazine
Access this Pro+ Content for Free!
Features in this issue
Cover story: The U.S. government says Chinese IT giants Huawei and ZTE pose too much risk. But do they? Joel Snyder offers his take.
2013 IT security trends reveal mobile device security tops the list of priorities for security pros this year.
Allowing employee-owned mobile devices doesn’t have to mean accepting all BYOD risks. Infosec pros share their BYOD security strategies.
News in this issue
Going on the offense doesn’t mean actively targeting cybercriminals, experts say. Deceptive tactics, phony documents can help trip up attackers.
Columns in this issue
Information Security Magazine reveals the results of its 2013 Security Priority Survey and examines the security risks associated with purchasing IT hardware from China. Elsewhere in the issue, infosec pros share their strategies for BYOD security.
University information assurance programs are varied, but they are beginning to provide technology disciplines a level of security knowledge.
No ultimate test can give third-party software a clean bill of health, but careful assessment can help organizations gain more control over vendors.