Data Protection During the holidays

Key with christmas tree

The Holiday season is upon us, and most people will spend significantly more time traveling over the next month than they did for the rest of the year. The hours spent in airports on the way to visit family, friends, and loved ones, as well as massive increases in online shopping, both ramp up the [...] Read more »

BYOD Implementation: A Primer

BYOD mobile security

Bring Your Own Device – rarely in history has there been a string of four words that strikes so much fear and anxiety into the heart of dedicated IT security managers everywhere. BYOD policies are increasingly common across the corporate landscape. Companies both foreign and domestic have weighed the costs of purchasing new devices and [...] Read more »

Diverging Paths on Mobile Security

mobile device security

In a recent press release, Gary Kovacs, the new CEO of global security software company AVG, pinpointed the root cause of a great many security issues concerning mobile device technology. As the former head of Mozilla, Kovacs is not averse to shaking up industry expectations and unapologetically pointing fingers. True to form, the picture Kovacs [...] Read more »

Making Choices on BYOD

bring your own mobile device

Business and technology news site InformationWeek has just released their latest MUST READ compendium, a collection of stories that provide compelling and insightful analysis of tech industry trends. Chief among these stories is one we here at DSW also find interesting – the tech surrounding mobile device virtualization, and the three primary ways software companies [...] Read more »

Should FTC Powers Include Cyber Security Mandates?

The Federal Trade Commission made a brave move last Friday in announcing a joint settlement with noted mobile device producer HTC America. In an effort to ensure ongoing protection of consumer data, this settlement compels HTC to develop a series of solutions intended to shore up the security holes presently peppering many of the devices [...] Read more »

iPhone Forensics

Today’s article is a guest submission from the INFOSEC Institute, and it details how to perform iPhone forensics – which means pulling data from an iPhone. Although the article contains very detailed instructions on performing forensics on an iPhone, we think it is an extremely interesting read, even for those that do not have any [...] Read more »

Mobile Security in the New Year

Last week we talked about upcoming threats in the IT security industry – new types of exploits and intrusion methods we’re likely to see in larger numbers in the upcoming calendar year. This week, in something of a related story, we take a look at upcoming threats to the mobile device market, and consider a [...] Read more »

Mobile Payments – Yes or No?

A new trend in the tech industry, mobile wallets are increasingly popular with users who prefer the convenience and flash of using smart mobile devices to make and accept monetary transactions. While the technology certainly exists to implement mobile payments across a wide range of industries – Google and iPhone both offer a plethora of [...] Read more »

Dealing with the Culture of BYOD

The look ahead for members of the IT industry will require an increased attention to mobile devices. Added attention on these types of devices is even more of a nightmare as the enterprise or government entity grapples with how to control mobile devices that employees and even third party vendors bring into the corporate or [...] Read more »

Shiny New Objects of Week

3/5/12 A new non-profit collaborative, Trustworthy Internet Movement (TIM) was announced Qualy’s CEO at the 2012 RSA Conference. This non-profit initiative is supported through $500,000 in seed money from Qualys. The focus on this group will be to bring some sanity to Internet security by 2013. The non-profit, TIM is an effort to quickly mobilize [...] Read more »

Next Page »