BOB'S PIC FOR CURRENT POPULAR SEARCHES:
Here are some of the most popular search key words. You can click on the links below to go to a report page that we have created so you can quickly catch up on this important subject. Please CLICK HERE to give us your feedback. Let us know if you have any suggestions for this list, or questions on how to use our MPS specific search engine.
Articles from Ellen Messmer
1-16 of 16
Tablets and smartphones, which employees are bringing into work in "Bring Your Own Device" (BYOD) style, are leading IT managers to ask security questions, starting with whether they should sort out corporate mobile apps and data from personal ones. It's all encouraged a spate of security start-ups to come up with their own answers, and highlighted here are a few that have recently hung out a shingle for mobile security. But it's not just mobile spurring the creation of young security firms out to change the world.(Read Full Article)
Trusting the cloud to handle sensitive transactions and security services isn't for every enterprise, but organizations from banks to app developers are starting to give it a try.(Read Full Article)
Cloud computing services, whether software as a service (SaaS) or infrastructure as a service (IaaS), are subject to taxes, whether your cloud provider tells you or not when you purchase them. Reid Okimoto, senior manager in the state and local tax practice at KPMG, shares tips to help you understand the real cost of cloud computing.(Read Full Article)
Mobile-device security startup Averail makes its debut today with its "containerization" software and service intended to give IT managers control over mobile-device apps and their content.(Read Full Article)
Forrester Research predicts that with the "bring your own device" (BYOD) trend expected to increasingly include laptops in addition to smartphones and tablets, the approach to managing those devices is in for some big changes.
Forrester analyst Chenxi Wang in the report calls mobile-device management (MDM) a "heavy-handed approach -- more and more IT professionals have told us that they don't want to manage employee-owned devices. ... For these reasons, technologies such as mobile VDI, containers, app wrapping, and device virtualization have emerged to deliver personal-to-corporate segregation." However, at the same time Wang concedes that today "many of these technologies diminish ...
The Department of Defense (DOD) has begun including the security certification known as "CompTIA Advanced Security Practitioner" (CASP) in its accepted roster of industry-based security exams to prove technical skills, the trade group says.(Read Full Article)
A substantial number of businesses say cloud computing security challenges are daunting and the costs higher than they originally thought they would be, according to the Cloud Survey report published today by consultancy KPMG International.(Read Full Article)
Despite security concerns, businesses are growing more confident in adopting cloud-based services, and in addition are investing more in corporate mobile devices while also allowing employees to use their own in bring-your-own-device mode at work. So it's not surprising that recent security startups are zeroing in on things such as encrypting data held in the cloud or how to safeguard corporate data on BYOD devices. Venture-capital firms are eagerly funding these startups -- noticeable among them is Andreessen Horowitz, plowing $9.5 million into mobile-security startup Bluebox in June and $30 million into CipherCloud just last month.(Read Full Article)
The Security for Business Innovation Council, comprised of IT security professionals from 19 companies worldwide, called cloud computing the main disruptive force for 2013. In its report, "Information Security Shake-Up," the group said it was evident many organizations are preparing to move more business processes to the cloud. This year, it will even be "mission-critical apps and regulated data" consigned to the cloud.(Read Full Article)
It's the time when predictions for the new year run high, and when it comes to IT security, Gartner analysts are predicting that 2013 is going to be about expansion of cloud computing and the struggle by the enterprise to achieve appropriate security for it.(Read Full Article)
Ernst & Young's IT Security Survey Shows Struggle to Control Cloud Computing, Social Media and Mobile Risks
Many CIOs and chief information security officers are struggling to adapt security practices to a changing environment that includes cloud computing, social media and tablets, according to a survey of 1,850 such IT pros.(Read Full Article)
A survey of 650 information and security professionals about how the "bring your own device" (BYOD) trend is impacting their organizations finds one-quarter of them forbid use of personally owned devices such as smartphones and tablets on the network. However, the majority that do often lack meaningful policies or security controls related to these devices.(Read Full Article)
Business divisions are bypassing the IT department, making their own decisions to buy cloud-based application services or use mobile devices, raising the specter of so-called "shadow IT" that's outside the knowledge or control of the CIO and the IT staff.(Read Full Article)
- Gartner kicked off its Infrastructure & Operations Management Summit here today with a "top 10" list of the most significant emerging trends that will impact data centers and information technology used by businesses and government from now into the next four or five years. (Read Full Article)
1-16 of 16