Posts By Author:
Without an effective Mobile Device Management policy organizations will find themselves falling back on previous tactics of managing to standardization instead of managing end-user experience.
In the final installment in our three part point-counterpoint series,Unisys experts give you answers to the question: “When it comes to mobile devices, should IT departments secure the device, the user, the application, or the data?”
The need of the hour is to raise protection levels against cyber-crime with visibility across all aspects of security operations.
Unisys executives share contrasting views on the question: Should security be offensive or defensive?
When it comes to IT strategies, there are few absolutes. Our experts debate and discuss the question “How much security is enough?”
Finally, I want to highlight Steve Vinsik and his post on Cyber Crime: How to Prevent an Attack and Mitigate Damage. Again, if you remember June time frame, and were following business news, there was a RSA SecureID hack. While there was hype about the incident, Steve focused on immediate points enterprises should focus on [...]
What is Richard Bryant so worked up about? – Hacking threats, and the desire to demystify cyber crime.
While most blogosphere focused on the “what” of 2011 security challenges, we added more to the “how” enterprises are going to address these security challenges.
Patti Titus recently traveled to Belgium and Holland for meetings with clients and prospective clients. The activities centered around the Consumerization of IT and the disruptive trends and the impacts on their business operations and enterprise security. Some were far more advanced with their strategy and implementation than others.
Tom Kellerman speaks about the new security paradigm and the impact of mobile devices on cybersecurity.