PRO+ Premium Content/Information Security magazine

Thank you for joining!
Access your Pro+ Content below.
February 2014 Vol. 16 / No. 1

New devices, new threats: How to evaluate the devices we love

We've all survived the holiday rush and celebrations, and now the real fun begins: evaluating the security implications of the new mobile "toys" that people want to use to access corporate data, applications and networks. Niche items such as Google Glass and the Samsung Galaxy Gear smartwatch make for great stories around the water cooler, but in most organizations these devices currently have little impact. However, the influx of iPad and Android tablets and wide range of smartphones can really challenge network security, especially in organizations that support the bring your own device (BYOD) trend. Kevin Johnson BYOD is one of those topics that has adamant supporters and detractors. Honestly, I think BYOD is something that each organization has to evaluate based on its needs (and wants). But whatever the choice, mobile devices have to be evaluated at some level before you allow them to run on internal networks. How can you determine which devices to allow or what level of access these products should have? Of special concern...

Features in this issue

  • Beyond the Page: Cyberthreats

    by  Johannes B. Ullrich

    This February 2014 Information Security magazine supplement takes a deeper look into cyberthreats and examines advanced threat techniques including watering hole attacks and sophisticated spear phishing.

  • Cyberthreats: Know thy enemy in 2014

    by  Johannes B. Ullrich

    There's no place to hide as new cyberthreats and tried-and-true hacking techniques test security teams.

  • The changing face of advanced malware detection

    by  David Strom

    It's a new year of advanced threats, malicious code and holes to plug, but security teams are fighting back with help from global services.

Columns in this issue