The BYOD trend is still in its emergent phase and not really as widespread as all the buzz would have you believe, according to Christian Reilly of Citrix.
Securing the DNS is not the first thing on security teams’ minds, but can be key to shutting out the latest malware, according to Infoblox CEO Jesper Andersen.
Businesses continue to use unsecured devices to house and transmit sensitive corporate data,k which is was what drove infocomm security expert Dr Kwok-Yan Lam and banker and financier Michael Tse to found Soda, a Singapore-based startup that has developed a virtual tokenisation layer to secure mobile devices.
Conversations about IT security often revolve around technology and processes, and rarely about a third critical element: People. That’s a mistake, according to Jack Chan, a security strategist at Fortinet Inc’s FortiGuard Labs.
There has been a massive increase in malware detections on Monday mornings when users reconnect their devices to the corporate network, according to new research published recently in the annual NTT 2015 Global Threat Intelligence Report.
Many small-business owners believe the BYOD (bring-your-own-device) trend poses no threat to their company, and have no interest in spending effort on mobile device security, according to Kaspersky Lab.
Before you jump head first into your BYOD programme, consider a few things to help you establish the right blend of personal preference and workplace functionality, writes Brian Robison of Citrix.
US presidential candidate Hillary Clinton’s use of her personal email account for official business has lessons for businesses in terms of securing their users and devices, writes James Chia of Aruba Networks.
In view of recent high-profile security breaches and compliance failures, organisations need to find a way to plug the gap between security and operations (SecOps). Gavin Selkirk of BMC Asia Pacific looks at how organisations can modernise their approach to compliance and close the SecOps gap with a strategy designed for today’s complex, dynamic IT environments.
The key to securing the enterprise in this new world is to embrace a more holistic attitude to security that focuses on applications and identity, writes Chong Fook Hing of Oracle Corporation Malaysia.