Bring your own Device or Build your own Demise: Promises and Pitfalls of BYOD

I was recently asked a number of questions concerning bring-your-own-device (BYOD) security implications. Here are my responses… 1. According to research the majority of organisations now… [Read More…] View full post on IT-Director.com For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com View full post on National Cyber…

read more

RSA to build authentication into Apple, Android phones

RSA, the security division of EMC, today said it would collaborate with several mobile and virtualisation platform vendors to integrate RSA two-factor authentication and risk detection technologies. The goal of the “Secure by RSA Certified Mobile Partner Programme” is to optimise RSA SecurID two-factor authentication and RSA’s Adaptive Authentication for…

read more

Ariz. lawmakers say they will build border fence

By Amanda Lee Myers and Jacques Billeaud Associated Press PHOENIX — Arizona is taking on immigration once again, with state lawmakers collecting donations from the public to put fencing along every inch of the state’s porous Mexican border in a first-of-its-kind effort. The idea came from state Sen. Steve Smith,…

read more

Why publishers should build direct sales channels – Allen Noren on ebook sales success and competing in a global market.

In this TOC video podcast, Allen Noren, the head of O’Reilly’s online and marketing groups, addresses questions about how to succeed in the digital market, dealing with “Walmart world” deep discounts, and learning from fixed-price territories. View full post on O’Reilly News and Commentary View full post on National Cyber…

read more