"The vulnerability of data is increasing exponentially. Encryption of mobile data at rest, a commonly used attempt at security, is an inadequate measure. After all, encrypted data must be decrypted at some point to be used — and it is at that point that it becomes most vulnerable."
"In today’s business world, Enterprises of all shapes and sizes face growing legal ramifications as a result of their attempts to secure their data on employees’ personal devices after instituting a bring your own device (BYOD) program."
Today’s business landscape is facing emerging legal issues stemming from bring your own device (BYOD) initiatives. The shift towards the use of personal computing devices (laptops, tablets, smartphones and now watches) to conduct business in theory is a win-win strategy for both the . . .
The “Consumerization of IT” phenomenon received its biggest endorsement last quarter when the Department of Defense (DoD) announced its approval of government-issued iOS 6 mobile devices for use when connecting to DoD networks within current mobility pilots . . .
Earlier this month, Army Maj. General Stephen Smith, director of the Cyberspace Task Force for the service, discussed his plans for secure remote access. According to Maj. General Smith, the Army and the Defense Information Systems Agency will issue a broad agency announcement by the early summer detailing a new approach . . .
The list is long, and growing: It seems that a week doesn’t go by that some major company or agency isn’t breached for fun or profit. WikiLeaks and Anonymous, once known only to a subset of cyber geeks, are now household names . . .
In 2012, security, identity management and data entitlement will be very high priorities for organizations of all sizes and in all markets. Not only will the growth in the percentage of our workforce that teleworks amplify this issue . . .
The U.S. work force is increasingly embracing teleworking and mobile computing, and for the most part, this shift is a good thing. In today’s economy, office hours are no longer 9 to 5. Providing employees with the required resources and access to work away from the office will . . .
On the heels of President Obama’s most recent directive on rules for computer IT within the federal government, it is important that we, as an industry, examine the larger issue this directive brings to light . . .