Risk Management March 23, 2015 Leveraging Forecasting Techniques for Security 4 min read - For any technologist, keeping pace with new developments — particularly changes to the technology landscape — is key. Security forecasting can help.
Risk Management March 20, 2015 How Organizations Can Rebound From March Madness Mobile Misuse 3 min read - With the help of mobile threat management and user education, your organization can make sure the only March Madness upsets that occur are on the court.
March 19, 2015 BlackBerry Launches Secure Tablet in Collaboration With IBM, Samsung 3 min read - BlackBerry launched a secure tablet for government and corporate use through a partnership with IBM and Samsung in what could be its chance for a comeback.
Data Protection March 19, 2015 For Data Security, Catering to the Business Will Be Essential 2 min read - In order to leverage the value of our data security solutions, we must address usability and translate actionable items at the business analyst level.
Application Security March 19, 2015 IBM-Sponsored Ponemon Institute Study Reveals Alarming State of Mobile Security for Apps 3 min read - According to an IBM-sponsored Ponemon Institute study on mobile security, apps are being created quickly to meet user demand but are not always secure.
March 18, 2015 Yahoo Mail Announces New Security Measures 2 min read - At the SXSW conference, Yahoo announced it will implement on-demand passwords and data encryption for its Yahoo Mail in order to improve security.
Data Protection March 18, 2015 In Data Security, What’s Your Security Nirvana? 2 min read - Approaching enterprise data security by identifying business drivers can help organizations reach their security nirvana and keep secure from threats.
March 17, 2015 US Senate Intelligence Committee Secretly Approves Cybersecurity Information Sharing Act 2 min read - The U.S. Senate Intelligence Committee recently approved the Cybersecurity Information Sharing Act, which would encourage businesses to share information.
CISO March 17, 2015 Self-Improvement Agenda for CISOs: Communicating the Business Value of Security 4 min read - When conveying the business value of security, CISOs must remember that awareness isn't understanding, silence isn't approval and some metrics don't work.
Endpoint March 17, 2015 Android for Work Rewraps Lollipop for Business Security 3 min read - Android for Work is offering a sweeter choice than the sour taste of fragmentation when it comes to business security and device management.