At the outset of the BYOD trend, mobile security was about protecting devices. Today, mature organizations are focused more on protecting data and ensuring proper identity and access management.
In this exclusive session, a sequel to Mobile: Learn from Intel's CISO on Securing Employee-Owned Devices, Malcolm...
A new survey reveals the willingness of consumers to accept other authentication factors beyond username and password, even if they require more work on their part.
A key component of most information security strategies is robust identity and access management (IAM). So how can IT extend this same security to a mobile workforce with personalized, won't-use-anything-else smartphones and tablets?
It's time to extend the same controls you have on the desktop to mobile users....
Beyond mobile device and data security, what are the ID and access challenges facing security leaders - and how are cutting-edge organizations tackling them? CSOs Elayne Starkey and Malcolm Harkins share tips.
Business line managers are in better positions to control and monitor network and system access privileges than IT departments, since they know their employees and the privileges they should be provided, says Bill Evans of Dell Software.
To improve security and increase workforce productivity across an enterprise, a set of integrated capabilities is needed, says Corey Williams, senior director of product management at Centrify.
Because data stored in a cloud-based "sandbox" environment for testing purposes is vulnerable, it should be masked to protect sensitive information, says Karen Hsu of Informatica.
Most organizations are challenged by having too much information in too many places. But Dieter Schuller of Radiant Logic says centralizing data can improve identity management.
Because managing identities is a global problem, it requires a global solution, says Paul Simmonds of the Jericho Forum. A new organization has been established to address global identity. Simmonds offers insight.
National Institute of Standards and Technology's Jeremy Grant says the government will fund pilot projects to accelerate progress toward the creation of improved, interoperable systems for secure, privacy-enhancing trusted online credentials.
Banking institutions have spent the last two years enhancing authentication to conform to regulatory mandates. Organizations in other sectors can learn important authentication lessons from the banking industry.
The evolution of threats and rise of mobility are leading organizations to improve user authentication. What are the new strategies and solutions security leaders in all sectors will employ this year?
Absent a uniform method, the NIST interagency report investigates credential revocation, focusing on identifying missing requirements, and suggests a model for credential reliability and revocation services that addresses those missing requirements.
BYOD cannot be avoided - nor should it be. The benefits to organizations, including increased agility, efficiency and collaboration, are too valuable to ignore. At the same time, organizations must appropriately secure BYOD environments against threats such as malware, theft and malicious insiders.
Read this...
Five pilot projects unveiled by the federal government, if successful, should build trust in online commerce, helping to boost the economy, says Jeremy Grant, head of the National Strategy for Trusted Identities in Cyberspace National Program office.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.