Readers’ Poll: What Solutions Should Lead the Charge for Enhanced Network Security in 2013?

2012 has been quite the year for the mobile security industry. We’ve seen bring your own device (BYOD) come to the forefront of discussions, both in terms of its benefits and threats to network security. We’ve seen multiple strands of different trojans and malware that cost companies hundreds of thousands of dollars. Microsoft released Windows 8, thus sparking the debate over exclusively relying on DirectAccess in lieu of virtual private networks (VPNs). As a result of these major trends, we’re beginning to see industry-wide recognition that simple password protection is no longer sufficient. Rather, such techniques as split tunneling, two-factor authentication, and encryption offer safer ways to access corporate networks remotely. So we want to know, given the growing spotlight on threats to remote access, what solutions do you think should lead the charge for enhanced network security in the coming year? As always, feel free to elaborate in the comments. [polldaddy...

Readers' Poll: What Solutions Should Lead the Charge for Enhanced Network Security in 2013?

2012 has been quite the year for the mobile security industry. We’ve seen bring your own device (BYOD) come to the forefront of discussions, both in terms of its benefits and threats to network security. We’ve seen multiple strands of different trojans and malware that cost companies hundreds of thousands of dollars. Microsoft released Windows 8, thus sparking the debate over exclusively relying on DirectAccess in lieu of virtual private networks (VPNs). As a result of these major trends, we’re beginning to see industry-wide recognition that simple password protection is no longer sufficient. Rather, such techniques as split tunneling, two-factor authentication, and encryption offer safer ways to access corporate networks remotely. So we want to know, given the growing spotlight on threats to remote access, what solutions do you think should lead the charge for enhanced network security in the coming year? As always, feel free to elaborate in the comments. [polldaddy...

Forward Thinking: Network Security Predictions for 2013

The proliferation of social networking and the acceleration of personal devices for corporate use can be a boon for remote workers. Unfortunately, this increase in systems and cross-platform networks can also be a huge opportunity for cybercriminals looking to launch targeted attacks. In 2012, the sophistication of mobile malware intensified, damaging individuals, businesses and governments alike, revealing one of the year’s top security trends: that the traditional combination of username and password is not a strong enough security barrier. With this in mind, the following security experts share their thoughts on why more secure authentication methods are needed in 2013: “The fact is that passwords, as a security technology, are reaching the end of their useful life. Moving to a world where alternative authentication systems are the norm is incredibly difficult, and as a consequence we are entering into a period of time when we are going to have to continue to rely on a security control that doesn’t work. Encouraging users to pick longer passphrases, and proactively auditing networks for weak passwords are steps that can be helpful during this time. Increasingly, we are going to see attackers entering networks with legitimate access credentials without ever having to fire an exploit that would trigger an intrusion detection system. We need to be prepared for this type of attack activity.” Tom Cross, director of security research at Lancope  “Nine out of 10 intrusions involved compromised identities or authentication systems, so enterprises need to make sure they have a sound process for creating, managing and monitoring user accounts and credentials for all of their systems, devices and networks.” – Wade Baker, Verizon...

What We’re Reading: Week of 12/17

CNET – Four security trends defined 2012, will impact 2013 eWeek – BYOD, Social Media Among Top Security Threats of 2013 CSO – The week in security: Attacks continue; are you ready for 2013? IT Business Edge – How to Approach Mobile Security in...

What We're Reading: Week of 12/17

CNET – Four security trends defined 2012, will impact 2013 eWeek – BYOD, Social Media Among Top Security Threats of 2013 CSO – The week in security: Attacks continue; are you ready for 2013? IT Business Edge – How to Approach Mobile Security in...