June Issue of Information Security magazine: Mobile Security: A New Game Planby Information Security Magazine
Published on: 06/02/2011
This month’s Information Security Magazine Online cover story highlights the importance for an updated security game plan due to the influx of personal smartphones and other computing devices making their way into the enterprise. Although companies can put a lock down on corporate owned mobile devices, there's no way to know how many personally owned systems need to be monitored, forcing a major shift away from the standard model of corporate-owned, corporate-controlled computer systems. Learn the Rules of the Road for personally owned mobile devices to avoid mobile malware threats and malicious mobile applications.
Also featured in this issue:
Learn how to focus your SIM solution to avoid information overload; FISMA has undergone a bit of an overhaul, but streamlining its requirements has presented a few challenges.
Sponsored By: Novell, CDW, ArcSight, an HP Company, Core Security Technologies, SourceFire, TriGeo, FireEye, Imperva, SenSage, Dell, Brainloop & Tripwire
Innovations in operating system virtualization and server hardware permanently changed the footprint, architecture, and operations of data centers. As such, these innovations have also had a significant impact on how auditors must... More...
May 24, 2011
Most enterprise network perimeters are protected by firewalls that block unsolicited network-based attacks. Most enterprise workstations have antivirus protection for widespread and well-known exploits. And most enterprise mail... More...
May 18, 2011
Other content by this company