Back to homepage
BYOD/Big Data

USDA eyes BYOD, faces security and workforce challenges – Fierce Mobile Government

The Agriculture Department is in the process of drafting a bring your own device , or BYOD , strategy but it still has several security and workforce hurdles to overcome,


Microsoft blacklists latest rogue SSL certificates, Mozilla mulls sanctions for issuer

Microsoft has blacklisted a subordinate CA certificate that was wrongfully used to issue SSL certificates for several Google websites. The action will prevent those certificates from being used in Google

Identity Theft

Streamlining Security Identity Governance

Today, IT security professionals face a two headed challenge; sophisticated security threats and constant changing of employment positions make secure access difficult.  How can you make sure only the right


Which controls can prevent multifunction printer security risks?

Hackers are infiltrating the enterprise through multifunction printers. Expert Kevin Beaver explains how to mitigate the threat and improve printer security. I read that hackers can infiltrate corporate networks through multifunction


Study finds lack of investment in mobile app security

The Ponemon Institute says enterprises are devoting millions of dollars to mobile application development, but barely any of the money is focused on security. A new study from the Ponemon Institute


See clearly in the cloud with threat-aware identity and access management

Traditionally, security has been a major inhibitor for many organizations considering a cloud deployment. Businesses worry about reduced visibility, less control over security policies, and new threats in a shared

Vendor News

Foxconn to enter information security realm with joint venture

Foxconn Technology Group isn’t satisfied with just making iPhones, and plans to break into the information security market through an upcoming joint venture. On Thursday, the Taiwanese manufacturing giant announced

Industry Insights

‘States preparing cyber-attack options to cripple enemies’ infrastructure’

Gabi Siboni, who directs the cybersecurity program at the Tel Aviv-based Institute for National Security Studies (INSS), told The Jerusalem Post this week that states are preparing “red button” options

BYOD/Big Data

Mobile app behavior presents hidden BYOD risks for enterprises

The report points out that BYOD risk doesn’t just arise from malicious hackers and rogue nations. Threats to data and security may be hidden in the most innocuous-seeming apps that

Vendor News

Bedrock Automation Releases 2nd White Paper on Open Secure Automation™

SAN JOSE, Calif., March 24, 2015 /PRNewswire/ — Bedrock Automation announces the release of the second in a series of white papers on the new epoch of automation in industrial