Android mobile devices are the choice of many employees bringing their personal devices into the workplace. So the security of those devices is upper most in the minds of IT security pros. Yet some critical Android vulnerabilities identified in 2013 and last year still pose risks.
IT security types prefer Apple devices because of their reputation for strong security, but the recent discovery of the Thunderstrike bootkit could call into question that security reputation.
The release of a new hacking tool targeting iCloud's Apple ID dictionary is not reassuring for iPhone users and others who store data, knowingly or unknowingly, on iCloud.
In this issue, we offer a look into the IT security threats looming on the horizon for next year through an exclusive interview with Steve Durbin, global vice president of the not-for-profit Information Security Forum.
In a number of recent data breaches, the entry point for the hackers was through a third party vendor. FierceITSecurity recently sat down with Steve Durbin, global vice president of the non-for-profit Information Security Forum, to discuss third party security and other security challenges that will confont IT security teams in the coming year.
As businesses continue to move toward a more mobile-centric workflow, many CIOs will be forced to adapt or run the risk of losing their job. Re search from Forrester commissioned by data protection specialist Druva predicted that 20 percent of CIOs in regulated industries would be fired by 2016 if they did not institute a sound information governance policy.
Those involved in IT security are acutely aware that as the number of nodes in a network of intelligent devices--Internet of Things (IoT), for instance--rises, so do the number of potential vectors for attacking that system. Thus, there is increasing concern that IoT's value propositions go hand-in-hand with vulnerabilities that could threaten the enterprises employing them, argues Greg Shannon with the IEEE and Carnegie Mellon.
The internet will become the corporate network perimeter, predicts Paul Lipman, CEO of cloud security service provider iSheriff.
This year has been a record year for data breaches. But what does next year hold for the IT security industry?
The top three technology areas where enterprises are investing are mobile security/mobile device management, BYOD policy development and mobilizing business apps, according to Joe Pappano, president of IBM's MDM firm MaaS360 by Fiberlink.