BYOD Management Tools and Tactics

Like it or not, aware of it or not, your company now has a bring-your-own-device (BYOD) aspect to its mobility program. Employees are bringing in devices as quick as a manufacturer can pop out a new trendy, glitzy, always-on gadget. And that’s not going to stop anytime soon; not ever, actually. You need BYOD management…

Two Factor Authentication: SMS vs. Tokens

The numbers are staggering. About 750 million airline passengers must remove their shoes every year because one lone nut, Richard Reid (now a resident of a supermax prison in Colorado), once tried to blow up a plane with a shoe loaded with Pentaerythritoltetranitrate (PETN). The hordes of stamping stockinged feet notwithstanding, PETN is not detectable…

RSA 2011- Industry Focusing on Virtualization, Mobility and Data

The 20th annual RSA Conference, which took place Feb. 14-18 in San Francisco, was a huge success this year. Over 20,000 practitioners, corporate buyers, and security vendors gathered to smooze, sell their wares and talk security. This was definitely the most crowded and most upbeat RSA conference I’ve seen in the past several years. Dare…