Users spend, on average, 82% of their mobile minutes with apps and just 18% with web browsers. It's the lean, restricted functionality of mobile apps that makes them both convenient and task-oriented - and a major reason why they're so attractive to consumers and businesses. But mobile app development and the...
The trends impacting business today-cloud adoption, increased mobility, rise of social media and the increased amount of online data sharing- make the need for strong authentication more important than ever.
The IT department can no longer firmly establish a network perimeter and rely on simple username and...
IT and the business are being impacted by many important trends-cloud adoption, increased mobility, the rise of social media, and the increasing flow of information across the extended enterprise. The old network perimeter is no longer relevant. Today's IT must deal with highly distributed identities across the...
"Trust" does not mean giving employees unrestricted and unnecessary access to information. With the right security controls, organizations can significantly reduce their exposure to the risk of insider threats. The key is to find the right balance between employee enablement and control, while holding employees...
The traditional dangers IT security teams have been facing and overcoming for years are being replaced by a far more hazardous, insidious form of attack: the Advanced Persistent Threat (APT).
Although APTs are an emerging threat vector, their impact has already been felt in substantial ways.
This white paper...
IT security professionals need to put security problems in terms a CEO or board member can understand in order to gain essential resources, Gartner's Paul Proctor says.
Schools are embracing the use of technology to cut costs, to perform research, roll out computer-based classes and exercises and to compete for students. At the same time, the school administration is being asked by parents, state, local, regional or even federal governments to make sure that students and faculty are...
Browser-based filesharing applications have made moving large files a very simple task for the masses. Large graphics files that cannot be sent via email due to size restrictions can now be transmitted using YouSendIt! or drop.box. These applications are easier to use than FTP and the risk of inadvertent sharing of...
Mobile file sharing has become a necessity for today's enterprises. Nearly all workers are mobile, and most workers are carrying three mobile devices, including a smartphone and a tablet. To stay productive, workers need access to all their files on all their devices. They also need to be able to share files...
The typical mobile worker is carrying three or more mobile devices, at least one of which is a personal device brought from home. Organizations need to protect their data on every mobile device it resides. Unfortunately, enterprise mobile security falls short much of the time.
Download this white paper to...
The growing requirement for mobile access and BYOD (Bring Your Own Device) can give organizations
significant headaches in areas of security, management of devices, and content availability. How employees
access corporate information is changing and organizations need to respond to these changes or risk having...
Recognizing the security workforce shortage is one thing. Addressing it is quite another. What will it take to truly grow the workforce? Diana Burley of The George Washington University shares her vision.
Letting women make mistakes, as men are allowed to do, could help grow the female IT security workforce from its current level of less than 30 percent. That's a conclusion of a panel of IT security experts assembled by Information Security Media Group.
In the wake of its massive data breach, Target Corp. has hired as its first CISO an executive with information security leadership experience at two of the nation's largest corporations.
Luxury retailer Neiman Marcus is searching for its first CISO following the company's major data breach last year. Security experts weigh in on the attributes of ideal candidates and offer advice for how they should tackle the job.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.