Menu

Blogs

Showing Blog Posts: 1–10 of 16 tagged BYOD

  • Securosis Guide: Data Security

    by Securosis Team on April 13, 2015

    This post is part of a multi-part series about the Securosis Guide to the RSA Conference (download the RSAC-G PDF). Please scroll to the bottom for links to other posts in the series. Data security is the toughest coverage area to write up this year. It reminds us of those bad apocalypse films, where everyone runs around building DIY tanks and improvising explosives to "save the children," before…

  • Guidelines for Mobile Computing Security

    by Robert Moskowitz on December 15, 2014

    Mobililty is clearly the future of computing. Smartphones and tablets are more powerful and bring-your-own device is an accepted reality. This raises major security issues, as mobile computing can be readily compromised at the device, network and wireless connectivity levels. The mobile device itself—whether a portable computer, personal digital assistant, laptop, smartphone, tablet computer, or…

  • The Bright Future of Mobile Payments

    by John Linkous on November 7, 2014

    Cashless payment for goods and services continues to evolve, and mobile payments are quickly becoming the battleground for new products and technologies that drive consumer and merchant convenience. Such payments ensure rapid payment for credit issuers and other constituents in the transaction chain. Some of these technologies are still evolving and represent truly revolutionary approaches, while…

  • Data Privacy in the 21st Century

    by Robert Moskowitz on September 18, 2014

    Privacy impacts both the quality of life and business success. In today's highly automated and digitized world, the concept of "privacy" effectively boils down to data privacy.Simply put, you want to be able to keep certain information from being shared (voluntarily or involuntarily) with others. Although the word "privacy" does not appear in the United States Constitution, the Supreme Court has…

  • Mobile Device Management and the Ubiquity of Mobile Authentication

    by John Linkous on September 2, 2014

    We all know that mobile devices are rapidly becoming an absolutely indispensable component of the online world. , This makes mobile device management even more critical, regardless of who is managing the device: a large enterprise, a small business, or just you. Online banking and other sites require a mobile device in order to send a one-time password to authenticate transactions. Smartphone…

  • BYOD: Security and Privacy

    by Christopher Burgess on June 18, 2014

    If your office has a BYOD (bring your own device) policy, your employees are connecting your ecosystem with their own devices, as are your partners with your intranet—and you may have little knowledge about these devices. The good news is that BYOD security and privacy implementation has a number of defined paths that can help you navigate through this jungle of privacy, security, and legal…

  • A Tale of Two Cultures: Cool or Vigilant. Can the Security Industry Have Both?

    by Alex Bender on June 6, 2014

    We live in an age when a company’s “cool corporate culture” can actually come to influence them as a brand. Multi-billion dollar company Google offers an open, startup-like culture with an office layout that encourages spontaneous interactions. Earlier this year, the media was abuzz with the news that popular online shoe and clothing shop Zappos would transform itself from a traditional…

  • Greatly Reduce Data Theft by Knowing the Who and Where of Your Data

    by Christopher Burgess on May 9, 2014

    The universal constant of every business, regardless of size or industry, is that it has important data, and that data may be the target for theft. What should be the second constant is knowledge of where the data is located. Once you know its location, you can sort out who has access. This sounds simple, yet so many companies are unable to say with certainty where their data is, who has access…

  • BYOD Is Alive and Growing in APAC

    by Christopher Burgess on May 5, 2014

    Bring your own device (BYOD) adoption in APAC is alive and well, and is expected to increase by more than 20 percent from 2014 to 2020, according to a study by Grand View Research. Two driving factors for this growth are reduced hardware costs and the maturation of cloud-based solutions, and the devices of choice are smartphones and tablets. What's in it for the businesses? A report from…

  • Training Bad Habits Out of Users: End User Training

    by Christopher Burgess on April 1, 2014

    User behavior is the magic ingredient which can ensure end user training programs are successful or an ignoble failure. The recent RSA Conference 2014 in San Francisco featured a panel discussion on this topic, "Changing User Behavior: The Science of Awareness" hosted by Frank Dimina, director of federal sales at Check Point Software Technologies. Dimina asked the panelists (Kati Rodzon, an…

This document was retrieved from http://www.rsaconference.com/blogs on Sun, 26 Apr 2015 18:33:08 -0400.
© 2015 EMC Corporation. All rights reserved.