When it comes to cloud security, what are the pressing concerns of IT pros at SMBs? We went straight to the source – IT professionals at SMBs – and asked them. Our colleagues at CloudEntr, with the help of the Spiceworks IT community, recently surveyed 430+ IT pros to find what SMBs were really thinking about the […]
Posts in Enterprise Security
Posted on 19th Nov 2014 by Shannon Taylor in Enterprise Security
Posted on 14th Nov 2014 by Jennifer Dean in Enterprise Security
Home Depot dealt with its data breach by switching operating system but upon closer inspection it would perhaps have been better to invest in strong authentication technology and staff training.
Posted on 7th Nov 2014 by Jennifer Dean in Enterprise Security
The CFO arguably has the top job when it comes to assessing risk and making decisions on security investments. Most will have the support of the CIO in evaluating all the risks associated with technology, but have they considered all the issues that modern working practice expose the executive management team to?
Posted on 31st Oct 2014 by Jennifer Dean in Enterprise Security
CIOs considering how their organization is exposed to different risks could gain some helpful insights from the heroes and villains in recent comic-book movie adaptions.
Posted on 27th Oct 2014 by Olivier Guichard in Mobile
See how Gemalto’s R&D team developed a WebRTC-based VOIP demo secured using a SIM card and the W3C secure element access API.
Posted on 24th Oct 2014 by Jennifer Dean in Enterprise Security
C-level executives are arguably a business’ most valuable and vulnerable asset. We’ve compiled five tips so you can encourage them to defend themselves when they’re out and about.
Posted on 17th Oct 2014 by Jennifer Dean in Enterprise Security
We believe the executive assistant is among those with the keys to the company’s lifeblood and information, so shouldn’t we be giving them the same level of protection as CxOs?
Posted on 13th Oct 2014 by Jennifer Dean in Enterprise Security
As Episode VII draws closer, we offer some observations for the leadership of the Galactic Empire to note with regard to managing authenticated access and dealing with cyber threats.
Posted on 10th Oct 2014 by Jennifer Dean in Enterprise Security
C-Suite executives need the latest technology to showcase a company’s services but this puts pressure on the IT department security around CxO devices. However, a balance can be struck.
Posted on 26th Sep 2014 by Brittany Jedrzejewski in Enterprise Security
As the leader of a company, the CEO has access to the most private, valuable information from corporate strategy and financial results to sensitive employee data. Few will argue with the fact that the CEO is someone who needs advanced security.