What We're Reading, Week of 1/24

Computerworld, Security Manager’s Journal: Lifting Rocks and Seeing What Dangers Lurk Beneath Them Information Magazine, Mobile Device Security Needs New Approach, Experts Say Mobile Enterprise, What to Watch for in Enterprise Mobility Network World, Survey on PCI: How It’s Impacting Network Security Processor, Supporting Mobile...

What We’re Reading, Week of 1/24

Computerworld, Security Manager’s Journal: Lifting Rocks and Seeing What Dangers Lurk Beneath Them Information Magazine, Mobile Device Security Needs New Approach, Experts Say Mobile Enterprise, What to Watch for in Enterprise Mobility Network World, Survey on PCI: How It’s Impacting Network Security Processor, Supporting Mobile...

Forward Thinking: Network Security Predictions for 2011, Part 3

Editor’s Note: This post is part of the Forward Thinking series, which features expert opinions on the top security trends of 2011. “IT law is evolving quickly. As technology changes, authorities around the world are enacting many new laws on security, privacy and data management. Globalization is exposing enterprises to the jurisdiction of countries they have never thought much about from a legal perspective. The result is that surprises abound and legal compliance becomes somewhat chaotic.” – Ben Wright, attorney and author of technology law books. “In terms of threats I’m not expecting to see anything new in 2011 that we haven’t already seen in 2010 and before. However, I would expect an increase in breaches, better regulation within industries in certain parts of the world and companies being held more accountable. Because of this I think it is important for companies to invest more in detecting breaches, improve or establish sufficient incident handling and response procedures and ensure compliance with tighter regulations where they exist. Compliance work is playing an ever increasing part in security professionals’ lives and I see this trend increasing in 2011.” – Thomas Cannon, security researcher “This year, there will be a wakeup call on mobile device security. Surveys show  three out of four people use their mobile device to share or access sensitive or personal data. And given the sophistication of attack vectors, every morsel of personal information fed to hackers gets them closer to gaming security. What’s even more startling, the very definition of a hacker is changing – the architects behind some recent attacks have been hobbyists, who in a few...

What We're Reading, Week of 1/17

Enterprise Networking Planet, IPv6 Day is Coming (But Not Until June) Gartner Blog, Security Search Shenanigans – Where is NAC on the Hype Cycle? Insecure About Security, Nearly Half of Large Mid-Market and Enterprise Organizations Will Increase Networking Spending in 2011 InfoWorld, Security Admins: Prepare for Tomorrow’s Tech Trend...

What We’re Reading, Week of 1/17

Enterprise Networking Planet, IPv6 Day is Coming (But Not Until June) Gartner Blog, Security Search Shenanigans – Where is NAC on the Hype Cycle? Insecure About Security, Nearly Half of Large Mid-Market and Enterprise Organizations Will Increase Networking Spending in 2011 InfoWorld, Security Admins: Prepare for Tomorrow’s Tech Trend...