BYOD

It’s Better To Bring Messaging Apps Out Of The Shadows

Organizations are implementing stricter mandates for what kind of platforms and mobile features employees can use on both personal and corporate-owned devices, prompting a dramatic increase in the rise of "shadow IT" like unauthorized messaging apps. By bringing messaging apps out of the shadows and into the mainstream, organizations can reduce the risk of both outside and inside threats to the enterprise.

Seriously?! Can You Not Do That? Chapter IV - Insecure Use of Public Wi-Fi

At one time or another, we’ve all connected to the Internet via public Wi-Fi – at a coffee shop, in a hotel, on a plane. The convenience is irresistible, but few people are aware that public Wi-Fi is one of the biggest risks to personal and business security because these networks are so easy to attack for hackers. Cybersecurity experts answer these questions: Are any public WiFi networks safe? What harm can be done on these public networks? And how can you protect yourself against this risk?

Balancing Security and Privacy in the Enterprise

Enterprise security teams have a namesake job to do – secure their organizations – but it does not have to come at the expense of their colleague’s privacy. How, then, do organizations balance the requirements and expectations of both sides and keep their data secure while ensuring that the company refrains from violating privacy laws?

Seriously?! Can You Not Do That? | Prologue

Ahhh yes, our employees. We love them dearly, but sometimes they do things that put the company at risk of a data breach or other cyber attack. I reached out to the InfoSec community to help me capture some of the more common scenarios and troubling cases where employees could cause a company harm, both unknowingly and maliciously.

Data Access And Security Are Out Of Sync

Enterprises  are struggling to find secure ways to allow trusted users access sensitive data. Traditional security models designed to protect limited entry points to the data are no longer viable. These best practices, presented by Gurucul’s CEO, Saryu Nayyar, can help address the challenges.

Stuck in Cybersecurity Hell? Here Are 5 Other Possible Ways Out of It

Mr. Shrobe recently published an article stating that formal education is the only way out of our cybersecurity hellhole. In response, Keirsten Brager wrote some alternative viewpoints from the perspective of a practitioner and a student of the discipline.

The Security Risks of Lost and Stolen Devices

Despite an increasing number of organizations are choosing to embrace the bring your own device (BYOD) trend, there are still considerable security risks involved that many are not aware of. This article will explain what are the possible security risks involved with BYOD and how to prevent them.