BankInfoSecurity.com

Avoiding BYOD?

Why Setting BYOD Policies Is Increasingly Critical


Avoiding BYOD?

Bring-your-own-device concerns are getting more complex, but most organizations aren't keeping up with the times, and their outdated policies and procedures prove it, says John Whaley of Moka5.

See Also: I Found an APT: Now What? Operationalizing Advanced Threat and Breach Response

In fact, BYOD security and best practices are often talked about more than they are implemented and used, he says.

BYOD is not just about ensuring employees are using secure devices, Whaley says. It's about ensuring corporations are protecting intellectual property when employees access their databases from home. And BYOD also is about not violating employees' privacy by inadvertently accessing personal data on devices they own.

During this interview recorded at RSA 2014, Whaley discusses:

  • How automation can enhance BYOD management;
  • Why organizations are reluctant to even broach the topic of BYOD;
  • How regulators may soon mandate certain BYOD policies and procedures.

Whaley serves as the founder and chief technology officer of Moka5 and is responsible for the technical vision of the company. Whaley previously worked at IBM's T.J. Watson Research Center and Tokyo Research Lab. He also was named one of the top 15 programmers in the USA Computing Olympiad.

Follow Follow Tracy Kitten on Twitter: @FraudBlogger






Security Agenda

RSA Conference Highlights and Insights

This compilation provides an overview of ISMG’s RSA 2014 coverage, from pre-event promotional materials to excerpts of our exclusive interviews.

Download Now
The State of Information Security

In this year's issue of Security Agenda, we explain why 2014 is finally the "The Year of Security."

Download Now





Latest Tweets and Mentions

Security Agenda

RSA Conference Highlights and Insights

This compilation provides an overview of ISMG’s RSA 2014 coverage, from pre-event promotional materials to excerpts of our exclusive interviews.

Download Now
The State of Information Security

In this year's issue of Security Agenda, we explain why 2014 is finally the "The Year of Security."

Download Now

close

Sign In

close

Create a FREE account

Tell us about yourself

(All Fields Required)

Create your user ID and password

Choose your subscription preferences

Select the Industries and Topics, Type of email content you would like to receive, and Region. (Leave all blank to receive none)

Step 1. Industries & Topics

Step 2. Choose Content

Step 3. Choose Region (s)

close
or
You'll have an opportunity to create your account later.
close
close
close