Surveys of IT decision-makers highlight the growth of bring-your-own device programs as well as the types of approaches and policies enterprises are adopting to keep pace with the wants and needs of their employees.
Mobile devices offer well-established benefits in terms of productivity and efficiency gains for employees and enhanced services for consumers. But there’s a catch: The ways smart phones, laptops and tablets interconnect work life and personal life raise serious security challenges for organizations—and the stakes are high.
While mobile devices aren't yet direct targets for enterprise attacks, they are at least conduits, able to siphon vast amounts of data nonetheless. Mobile devices used to commit data breaches increased significantly in cases closed in 2010.
Information security commentators love to predict what the future will bring. We have a security inflection point staring us in the face: October 19th, 2011. When the day arrives, we'll know what the next five years of enterprise information security will look like.
The Android security model includes a sandbox-like environment that segregates applications and makes good use of shared memory. It also puts the user in control of the device, in part by making the user accept permissions for the installation of any widget.
Over the past few years, computer hackers have managed to access and exploit a rich supply of mag-strip information, from several leading retailers and a credit card processor, to successfully ratchet some high profile thefts.
With the rapid rate of release-to-market and quick adoption, it seems to come as no surprise that hackers are looking into these platforms as well. What are the latest threats on the smart phone front?
In 1998, Intel announced the introduction of processor identities. Anti-fraud practitioners celebrated, security experts busied themselves thinking of the research implications, and privacy advocates were terrified...