BYOD Management Tools and Tactics

Like it or not, aware of it or not, your company now has a bring-your-own-device (BYOD) aspect to its mobility program. Employees are bringing in devices as quick as a manufacturer can pop out a new trendy, glitzy, always-on gadget. And that’s not going to stop anytime soon; not ever, actually. You need BYOD management…

Enterprise Mobility: The Future is Now

by Brian Duckering of Symantec Throughout the modern history of business, there have been countless technological innovations that have improved the way companies work. However, a few stand out from the rest in their capacity to disrupt the status quo. Perhaps the most obvious recent examples of such technological advances are the PC and the…

The War on Cybercrime is Not Lost

“To see victory only when it is within the ken of the common herd is not the acme of excellence.” – Sun Tzu by Blake McConnell of Symantec There may not be physical battle lines drawn, but the current conflict between cybercriminals and businesses and governments is just as real and damaging as a war…

The Security Tools CIOs are Buying Now

Security issues are so ubiquitous that many CIOs are tempted to bow to the seemingly inevitable and just buy insurance to blunt the losses. Cyber insurance coverage may be a good idea for some companies but it should never be used as a cop-out on locking the data center doors. Fortunately, most companies are continuing…

Cloud Reliability, Security, Performance Still a Concern

CEOs and CFOs are concerned with moving business-critical applications into virtual or cloud environments due to challenges including reliability, security, availability and performance. This according to Symantec Corp.’s cloud survey, 2011 Virtualization and Evolution to the Cloud Survey, which examined how organizations plan to move business-critical initiatives to virtual and hybrid cloud computing environments. The…

The Safe Shopper’s Cyber Shopping Guide

Like lions laying in wait for the herd at the watering hole, cybercriminals are crouched and ready to spring on unwary shoppers queuing to buy online. This is not news to the cyber-savvy but even they can fall victim to the ever changing threat these criminals represent. Sure, the litany of “don’t click links in…

How to Keep Track of Employees Social Media Usage

To say that confusion reigns over who is responsible for something said in social media is the understatement of the year. In a sad but comedic squabble over individual vs. corporate responsibility, a flurry of finger-pointing ensues only to end in a rash command to the rank and file to just “zip it already”. But…

Spies Among Us

A recent study produced by Verizon and the US Secret Service delivered a surprise finding: in last year’s electronics record breaches, nearly half were inside jobs, or, required insider cooperation. In the merged Verizon/Secret Service data set, 48 percent of breaches were attributed to users who maliciously abused their right to access corporate information. An…

Cloud Computing – Evaluating Security-as-a-Service

Over the past few years, more and more businesses have turned to software as a service (SaaS) to bring down costs. One category of offerings, which we’ll call “security as a service” deserves special consideration. More and more traditional software security vendors are developing and enhancing their service based offerings. These offerings typically include protection…

Does the Cloud Render CIOs Irrelevant?

The clouds are moving in, a storm front of lightening fast change. Its cresting waves threatening to drown corporate IT jobs in a sea of irrelevance. The CIO stands in the tempest wondering if his role, too, will be washed away. With all things IT inevitably moving to the cloud, how is an earthbound soul…