Making the Case for the Security Budget Requires Creativity and Clear...
Paula Musich Summary Bullets: When making the case for the security budget, it is critical to find metrics that succinctly describe the value of information security and do so in business terms. One of...
View ArticleGoogle’s Android and Google Play Apps Still Risky as Ever, but There Is Hope...
Paula Musich Summary Bullets: New vulnerability exposures highlight the continuing riskiness of enabling the use of Android devices within the enterprise, but carefully crafted BYOD policies can reduce...
View ArticleHow Much More Money Will be Lost Before Companies Begin Strategically...
Paula Musich Summary Bullets: Companies aren’t investing strategically in security because nobody really understands the full cost of cybercrime and it’s extremely difficult to measure risk accurately....
View ArticleBlack Hat: Hacking the Internet of Things for Fun and Profit
Paula Musich Summary Bullets: Vulnerabilities abound in the wide range of elements that make up the ‘Internet of Things’ (IoT), and developers do not have the security skills necessary to code their...
View ArticleNotes from the Mobility World: EMM and MADP Coopetition Is Alive and Growing
Paula Musich Summary Bullets: As you select your primary EMM or MEAP provider, keep in mind the staying power of the providers you select. Focus less on managing devices and more on how you are going...
View ArticleIntel Lures Away Cisco’s Security GM and a Top Sales VP, but Don’t Cry for Cisco
Paula Musich Summary Bullets: Despite Intel’s having lured Cisco security GM Chris Young to its ranks, Cisco retains a strong security bench and has already replaced its former all-star GM with a solid...
View ArticleBig Surprise: A New Study Shows the Cost of Cyber Crime is Going Up
Paula Musich Summary Bullets: With the cost of cyber crime going up along with the amount of time it takes to contain an attack, organizations should rethink their security spending priorities to focus...
View ArticleThe Pendulum’s Swing Back to Privacy is Just Getting Started
Paula Musich Summary Bullets: The growing use of encryption, especially in smartphones, gives privacy controls back to end users, much to law enforcement’s chagrin. The backlash against government...
View ArticleDon’t Assume Your EMM Solution Includes All the Mobile Security Your...
Paula Musich Summary Bullets: Not all enterprise mobility management solutions provide a full set of security controls that also include anti-malware programs. Enterprises looking to secure employee...
View ArticleThe Sony Hack: Harbinger of Things to Come?
Paula Musich Summary Bullets: Although some forensics details point to North Korean government involvement in the Sony hack, it’s impossible to tell whether it was the government or another group...
View Article
More Pages to Explore .....