Tag Cloud

Bloggers

Blog

Follow and talk to Infosecurity's bloggers.

Follow Infosecurity's bloggers as they share their thoughts on the industry, technology, and much more. Our bloggers have been selected for their industry expertise. They welcome interaction, so we encourage you to add your opinions to theirs.

0
comments
By Cesare Garlati Adapt, accept and manage: a BYOD mantra for corporate IT RIM and Apple: two firms with more contrasting current fortunes you could not wish to imagine. The once high-flying Canadian BlackBerry-maker, for so long the darling of IT managers and beloved of time-starved execs the w ...
Posted 31 October 2012 by Cloud Security Alliance (CSA)
0
comments
Riding the Consumerization Wave
By Cesare Garlati Rather than resist it, organizations should embrace Consumerization to unlock its business potential. This requires a strategic approach, flexible policies and appropriate security and management tools. The Consumerization of IT is the single most influential technology trend of ...
Posted 07 October 2012 by Cloud Security Alliance (CSA)
0
comments
By Cesare Garlati Talking regularly about the consumerization of IT can often make one sound like a broken record, but the economic, security and management challenges it throws up for enterprises are too important to ignore. The problems boil down to a lack of control, which can be described in t ...
Posted 19 September 2012 by Cloud Security Alliance (CSA)
1
comment
By Cesare Garlati Mary D. joined MD&M Inc. in 2009. Being an Apple enthusiast, she was quite excited to learn that the company offered an innovative BYOD program that allows employees to use their own iPhone for work. As part of the new hire package, Mary signed the acceptable use policy and wa ...
Posted 31 July 2012 by Cloud Security Alliance (CSA)
0
comments
Addressing the Consumerization of IT
Bring Your Own Device or Consumerization of IT are fairly hot themes in a lot of customer organizations. When I talk to customers, there are typically different reactions, once we bring this up. Some tell us that it is not part of their strategy; some tell us that they plan to do it but that they ha ...
Posted 26 April 2012 by Roger Halbheer
0
comments
The 1985 iPhone In a Truck
 People of a certain age often enjoy recalling for younger folk the size of the early mobile phones that were lugged around in the mid-1980s, whilst marvelling at the latest smartphones. These brick-sized devices could not even send text (SMS) messages (the first of which was sent in 1992); the ...
Posted 28 October 2011 by Bob Tarzey
0
comments
Smart Thinking
Most people may not immediately recognize the name Reinhold Niebuhr, but they are probably familiar with some version of his best known prayer: "God grant me the serenity to accept the things I cannot change, courage to change the things I can change, and the wisdom to know the difference.&q ...
Posted 01 July 2011 by Geoff Webb
0
comments
  The growing WiFi capability in the variety of consumer devices is readily evident nowadays. These devices include cameras, camcorders, printers, scanners, smartphones, televisions, music/video players, e-book readers and many more. Having been equipped with WiFi capability, these devices are ...
Posted 29 September 2010 by Ajay Gupta
0
comments
One-sided Explosion
Consumerization – the use of consumer products within the corporate environment, is one of the more challenging issues for security teams to deal with. While a standard, well-defined, and well-protected infrastrucutre is a nice idea, there is more and more pressure to open up the network ...
Posted 09 September 2010 by Geoff Webb
Showing 1 - 9 of 9 blogs
View the RSS feed for this blog »
We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×