As it seeks information from vendors about implementing a more robust mobile device management system to ensure security, the Department of Veteran's Affairs has reported its first case of a stolen iPad.
The BlackBerry disruption strikes at a core IT security precept: availability. Yet, as cybersecurity and IT architecture practitioner Winn Schwartau points out, it also raises the less-often talked about proposition of accountability.
Roger Baker, CIO at the Department of Veterans Affairs, outlines the department's mobile device security strategy, providing details on the rollout of iPhones and iPads.
Facial recognition, arguably, is the technology that most threatens individual privacy online, and that's on the mind of Senate Commerce Committee Chairman Jay Rockefeller, who has asked the FTC to report on its growing use.
Two recent major breach incidents call attention to the value of encrypting backup tapes. A new survey shows how many organizations are taking this precaution.
Giving employees the chance to use their own mobile devices on their employers' network isn't necessarily given. That's what Delaware Chief Security Officer Elayne Starkey found when the state implemented a new program to allow the secure use of personal devices on state networks.
Winn Schwartau says the BlackBerry disruption this past week (see BlackBerry Disruptions: Where to Start?) hit at the heart of one of the fundamentals of IT security: availability.
The disruption of text messaging and Web browsing for BlackBerry customers opens up issues of company transparency and business continuity. How should the company have responded?
As employers increasingly realize the importance of information risk management, security, audit and governance, they look to certifications to identify prospective employees.
Benjamin Franklin. Thomas Edison. Henry Ford. If there were a Mount Rushmore of great inventors, it wouldn't be out of line to imagine Steve Jobs' face carved into the stone.
"With a company-issued device, you can issue a policy that says users have no rights of privacy over information on the device," says Javelin's Tom Wills. But with employee-owned devices? A whole new set of issues.
Elayne Starkey recently gave up her BlackBerry for an iPhone, and uses the Apple mobile device for personal and work doings, securely connecting to the computer system of her employer, the state of Delaware.
When it comes to mobile banking, which do you believe is the greater security risk: the latest evolution of malware or continued bad behavior by the end user? Experts' answers may surprise you.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.