IoT: Get Security Right The First Time
Let's start building security into the Internet of Things now, before everything becomes connected -- and hackable.
Why a User-Centric Approach is Required for Network Security
Is your enterprise one of the many that are "subject to the whims of fickle consumer-business users" when it comes to adopting new technology?
New Ways to Secure Mobile Devices for BYOD
The discussion on BYOD centers on whether employees working more efficiently on their personal devices is worth whatever network security vulnerabilities are sown when enterprises allow numerous...
Will Network Security Concerns Sink Government BYOD?
The Department of Homeland Security (DHS) issued a warning last week that the computer network of a public utility company had been compromised by a "sophisticated threat actor," likely through a...
BYOD and Its Risks to Network Security
In the not-so-distant past, when enterprises lacked ubiquitous high-speed Internet connections and the means to provide employees with remote access, organizations were far more likely to enforce...