BYOD

Just when we thought we had BYOD under control, the world was introduced to a whole new animal of mobile devices: wearable technology. Whether information security professionals can control this new beast—running rampant and creating significant risk—is the question facing IT security today. BYOD and mobility remind me of the Jurassic Park film franchise. In…

+ read more

Travis Greene
Aug 18, 2015
12:03 pm
Reads:
2,385
Score:
Unrated

The rise of mobility in the workplace is prompting government agencies to investigate using multi-factor authentication for access to applications while maintaining compliance to Homeland Security Presidential Directive 12 (HSPD 12). Issued in 2004, this directive mandates common identification standards for federal employees and contractors. Among other security measures, HSPD 12 resulted in the use…

+ read more

David Shephard
Jun 11, 2015
7:13 am
Reads:
3,009
Score:
5

The bring-your-own-device (BYOD) trend isn’t just for the enterprise. More and more emergency responders, such as Fire & Rescue NSW and police departments around the world are extending their computer-aided-dispatch (CAD) systems to include mobile devices. CAD allows emergency dispatch personnel to share knowledge of changing events with officers in the field. In the City…

+ read more

David Shephard
Jun 4, 2015
7:55 am
Reads:
2,352
Score:
Unrated

Mobile devices have almost become human appendages. Look around any crowd and you’ll find someone buried in their smartphone or other mobile device, regardless of what’s going on around them. The workplace is no exception. With the adoption of mobile devices across enterprises, users have more flexibility and can potentially be more productive. However, bring-your-own-device…

+ read more

Travis Greene
Mar 26, 2015
8:08 am
Reads:
3,072
Score:
Unrated

With the release of the 2015 Cyberthreat Defense Report last week this number nerd took some time to review and collate some of the IT Security statistics and numbers that have piqued his interest or curiosity over the last few months. From protecting user data against the growing number of threats to ensuring the continuity…

+ read more

David Shephard
Mar 16, 2015
1:51 pm
Reads:
40,491
Score:
4.75

There was a time in my life when I got so far into the weeds of wife-ing, mothering, and working, that in desperation I began categorizing my day’s activities into three categories: Near Misses, Fails, and Epic Fails. The thinking was that if I could prioritize reducing the number of “near misses,” I could ultimately…

+ read more

Rhonda Holloway
Feb 13, 2015
12:03 pm
Reads:
3,495
Score:
5

Identity defines who you are and what you do. But identity isn’t static—especially when it comes to IT. User identity can change and be manipulated, which introduces significant challenges for IT security teams. Multiple major data breaches made headlines in the past 18 months alone, and unless security teams start to focus on identity, they…

+ read more

David Mount
Feb 11, 2015
4:21 am
Reads:
2,493
Score:
5

Technology provides consumers the world at their fingertips, so it should come as no surprise that employees—who are really just consumers in disguise—insist on using their personal devices for work. The BYOD trend undoubtedly creates new opportunities and benefits for both employees and companies. But if it’s done wrong, BYOD can also frustrate employees and…

+ read more

Travis Greene
Feb 5, 2015
8:34 am
Reads:
4,279
Score:
Unrated

Having spent the early part of my career as a Naval Officer, I’m sometimes struck by parallels between the mechanical and digital worlds. There was a time when a majority of ships relied on steam to drive turbines for propulsion. Tremendous pressure and power was governed by a very simple device. The centrifugal governor worked…

+ read more

Travis Greene
Jan 20, 2015
9:34 am
Reads:
4,364
Score:
Unrated

Over three decades ago, the game Pitfall! came out for the Atari game console. In it, you control a character named Pitfall Harry, swinging over pits and crocodiles, avoiding fire, scorpions and many other dangers in the jungle while racing to gather treasure. The world is just as rife with dangers to your mobile enterprise…

+ read more

Travis Greene
Dec 10, 2014
10:15 am
Reads:
2,267
Score:
Unrated
Active Directory Authentication Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management IT Security Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Supported Troubleshooting Workflow