Posted on 29 October 2015 by
The domino effect of technology has always fascinated me – especially when it comes to what prompts the evolution of cyber security solutions and how quick enterprises embrace security best practices. For example, it’s not news that the increasing capabilities of mobile devices and the networks supporting them means employees are able to get more […]
Posted on 03 September 2015 by
Much of the discussion around the Internet of Things (IoT) focuses on the sheer number of things and the volumes of data they’ll generate. Some even discuss security. But of much greater concern is the foundation on which trust is built in this increasingly complex environment – identity. And identity in the IoT isn’t users […]
Posted on 19 August 2015 by
luetooth Smart is a viable technology that enterprise IT can easily implement into a current corporate badge ecosystem and addresses the need for balance between security and mobility.
Posted on 12 August 2015 by
Mobile Workforce Security Blog Series – Part 6 Organizations worldwide are seeking greater employee mobility for a variety of business and quality of life reasons. Key to becoming a ‘mobile enterprise’ is the ability to manage and secure the identities and data within an IT ecosystem whose boundaries are becoming increasing blurry. This blog series […]
Posted on 04 August 2015 by
For security professionals, one of the primary challenges that arises with cloud computing is that they are faced with somehow protecting resources that, to varying degrees, they no longer have control over and for which traditional security controls like firewalls and IPS devices are ineffective. However, regardless of which cloud model you adopt – IaaS, […]
Posted on 29 July 2015 by
Get a few pointers to keep in mind when developing your mobile enterprise security plan.