Expert Lisa Phifer explains the process for creating a winning enterprise mobile device security policy that reduces the risk of mobile data threats. <img alt="How to write an effective enterprise mobile device security policy, Blog, Security, write., Enterprise, Mobile, policy, device, effective"height="0" width="0" border="0" style="display:none" src="http://segment-pixel.invitemedia.com/pixel?code=TechBiz &partnerID=167&key=segment”/> View full post…
Enterprise security threatened by mobile and virtualisation
Increased use of mobile devices, especially smartphones, in addition to the transition to virtualisation, are key factors weighing on enterprises trying to sort out security strategy and budgets, according to a survey of 688 information and security managers. According to the authoritative Ponemon Institute in the “State of the Endpoint”…
Loss of BlackBerry, security benefits would hurt enterprise mobile security
Opinion: BlackBerry security has been a boon to enterprises, and unless security pros help save the platform, enterprise mobile security will suffer. <img alt="Loss of BlackBerry, security benefits would hurt enterprise mobile security, Blog, Security, BLACKBERRY, would, Enterprise, Mobile, Loss, hurt, benefits"height="0" width="0" border="0" style="display:none" src="http://segment-pixel.invitemedia.com/pixel?code=TechBiz &partnerID=167&key=segment”/> View full post…
Enterprise must protect against malware with BYOD rise
Businesses have been lax to implement defence mechanisms against malware on mobile devices, despite the acceleration of the ‘bring-your-own-device’ (BYOD) trend in the workplace. Addressing attendees at the Australian Information Security Association (AISA) 2011 conference in Sydney, Lumension security and forensics analyst, Paul Henry, said the trend of staff bringing…
Palo Alto Networks Finds Unknown Malware Rampant In Enterprise Networks
SANTA CLARA, Calif., Nov. 8, 2011 /PRNewswire/ — New research from Palo Alto Networks conducted using the company’s WildFire(TM) malware analysis engine shows that targeted and unknown malware are a reality in enterprise networks today, finding hundreds of unique, previously-unknown malware samples on live networks. Every network that tested WildFire’s…
Windows vs. Mac security: An enterprise endpoint security comparison
Expert Mike Chapple explores the security implications of running Macs on the corporate network in a side-by-side comparison of Windows vs. Mac security. <img alt="Windows vs. Mac security: An enterprise endpoint security comparison, Blog, Security, Enterprise, Endpoint, Windows, Comparison"height="0" width="0" border="0" style="display:none" src="http://segment-pixel.invitemedia.com/pixel?code=TechBiz &partnerID=167&key=segment”/> View full post on SearchSecurity: Network…
Tenable Network Security Named Fastest-Growing Enterprise Network Security Provider in North America on Deloitte’s 2011 Technology Fast 500™
View full post on Tenable Network Security View full post on National Cyber Security
Enterprise security spending up, but data protection overlooked
It’s no big secret. Contemporary attacks are levied over the web, attackers will craft custom malware to slither past anti-malware defences and any business on any given day can be compromised. That’s the reality of where information security stands today. Clearly, enterprises are aware of this as investments in many…
Stonesoft researchers evade enterprise IPS network protection
Finnish security firm Stonesoft claims to have developed 163 new attack methods that can evade network intrusion detection and prevention systems (IPS) over multiple communication protocols including IPv4, IPv6, TCP and HTTP. The company calls these methods advanced evasion techniques (AETs), a term it coined last year when it released…
#Ebook Deal/Day: Developing Enterprise iOS Applications – $7.49 (Save 50%)
Get “Developing Enterprise iOS Applications” today and save 50%! This sale ends at 2:00 AM 2011-10-06 (PDT, GMT-8:00). View full post on O’Reilly News and Commentary View full post on National Cyber Security Gergory Evans Gregory Evans | LinkedIn Interview With Gregory Evans Gregory Evans Security Expert Gregory Evans on…