Managing cybersecurity like a business risk: Part 1—Modeling opportunities and threats

Read more Managing cybersecurity like a business risk: Part 1—Modeling opportunities and threats

Security Practices and the Consumerization of IT


In
my last blog post, I mentioned Ernst & Young’s 14th annual Global Information Security Survey. One very interesting aspect of this survey is related to the use of mobile computing platforms.

The report states, “our survey shows that the adoption of tablets and smartphones ranked second-highest on the list of technology challenges perceived as most significant, with more than half of respondents listing it as a difficult or very difficult challenge.”

IT Security Controls for Mobile Computing Graph

Read more Security Practices and the Consumerization of IT

The Future of Cybersecurity: Understanding How the Next Billion Users Will Change Cyberspace

Read more The Future of Cybersecurity: Understanding How the Next Billion Users Will Change Cyberspace

Weekly Roundup : Sep 30, 2011 : Microsoft and Kaspersky Lab Take Down the Kelihos Botnet

Read more Weekly Roundup : Sep 30, 2011 : Microsoft and Kaspersky Lab Take Down the Kelihos Botnet

Application Security: 2011 & Beyond – A Forrester Research Report

Read more Application Security: 2011 & Beyond – A Forrester Research Report

We know where you are: Geolocation security tips

Read more We know where you are: Geolocation security tips

Security Week in Review: March 4, 2011

Read more Security Week in Review: March 4, 2011

Find My Phone helps secure your data

Read more Find My Phone helps secure your data

Security Thoughts from TechEd 2008

Read more Security Thoughts from TechEd 2008