Remove Article Remove Information Security Remove Mobile Remove Network
article thumbnail

How to close up the holes in your network

Network World

There might be one or more cloud services linking to your corporate and partner network, all being accessed by both mobile and traditional users. How can you enforce internal policies and industry compliance mandates when there’s no longer an identifiable network perimeter?

Network 60
article thumbnail

Users have little confidence their company can protect their mobile device

Network World

found that 64 percent of respondents are doubtful that their organization can prevent a mobile cyberattack, leaving employees' personal information vulnerable to theft. Alvaro Hoyos, chief information security officer at OneLogin, said that number does not surprise him.

Mobile 60
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Best IT and Tech Blogs – Must Read Information Technology Resources 2019

Galido

These areas of IT include general IT and technology, security, IT feeds, cloud computing, data center, mobile, social media, tips and tricks, virtualization, and operating system and software blogs. Below are 50+ of our favorite Information Technology Blogs – great suggested reads and follows to help stay ahead of the curve.

Resources 113
article thumbnail

The Endpoint Imperative: The Perimeter is Dead; Long Live the Perimeter!

Cloud Musings

Cloud, mobility and the Internet of Things have obliterated the traditional perimeter that protected organizations. The result: Higher productivity, but bigger challenges for security, data protection, and mobile device management. Kevin: This time, however, I'd like to really talk to you about this security perimeter thing.

article thumbnail

Guidance Software Federal Summit 6 March 2014

CTOvision

Recognized as a pioneer in the field of classified information protection, Mr. Bigman developed technical measures and procedures to manage the nation’s most sensitive secrets. Bigman worked in every area of information and data security, the last fifteen years as the Agency’s Chief Information Security Officer (CISO).

Software 257
article thumbnail

Tech Blogs – Best Must Read Tech Resources 2019

Galido

These areas of tech include general IT and technology, security, IT feeds, cloud computing, data center, mobile, social media, tips and tricks, virtualization, and operating system and software blogs. Sign up here for those links: Information Technology Articles. Help Net Security. Zone Alarm Cyber Security Blog.

Resources 107
article thumbnail

Best Tech Blogs – Must Read Tech Resources 2019

Galido

These areas of tech include general IT and technology, security, IT feeds, cloud computing, data center, mobile, social media, tips and tricks, virtualization, and operating system and software blogs. Sign up here for those links: Information Technology Articles. Help Net Security. Zone Alarm Cyber Security Blog.

Resources 107