"With a company-issued device, you can issue a policy that says users have no rights of privacy over information on the device," says Javelin's Tom Wills. But with employee-owned devices? A whole new set of issues.
Elayne Starkey recently gave up her BlackBerry for an iPhone, and uses the Apple mobile device for personal and work doings, securely connecting to the computer system of her employer, the state of Delaware.
Bertucci's has become a beloved destination for Italian food since its
formation in 1981. With more than 2,000 employees in over 90 locations,
managing unauthorized software downloads on their growing computer
systems has become a daunting task. Unsupported and unauthorized software
and downloads by employees...
Union Bank, a hallowed and service-oriented financial institution, relies on Good Technology to protect bank data on the mobile devices its employees prefer - while delivering the security and management the company requires.
Read this white paper to find out how Union Bank conquered the challenge and derived at...
As details about the Epsilon e-mail breach unfold, the list of affected companies grows, including major banks and merchants. Here is the latest list of the companies known to have been impacted by the incident.
Communicating with customers about the incident and warning them not to click links in phishing e-mails are all these impacted institutions and companies really can do, says Jeremiah Grossman, chief technology officer of WhiteHat Security.
"It is the biggest breach we have ever seen; and to say no financial information has been stolen is, well, understating the massive breach and concern," says Neil Schwartzman, founder and chief security specialist at CASL Consulting.
The DoD has banned the use of USB devices after an unauthorized device containing "agent.btz", a variation of the Storm Worm, was connected to a sensitive DoD network causing massive outages. To ensure security without impeding government business, a new policy is forthcoming that will require the management and...
As USB devices have evolved into useful storage media, they've also turned into a security nightmare for agencies.
The usage of USB devices should be encouraged and embraced to improve productivity, but they also must be managed to minimize the risks inherent with these tools.
This paper discusses how USB...