With the proliferation of machine-to-machine (M2M) devices and connections, some estimates putting the number as high as 50 billion devices by 2020, security pros are trying to come to grips with the security implications of all those endpoints.
The "soft" benefits of BYOD, such as increased employee satisfaction and productivity, can be hard to justify to CEOs in the face of clearer evidence that BYOD programs can cost companies money.
Wearables seem to be all the rage on tech media catwalks, but not so much with the general public. The problem: concerns about privacy. Still, offer consumers coupons or discounts, or help them with health and lifestyle maintenance, and you're half way there.
Enterprises need to begin crafting policies in order to harness the productivity benefits of wearables while ensuring that sensitive data is secure and privacy rights protected. These policies should be based on existing BYOD policies, yet take into account some of the unique attributes of wearables.
Smart meters, which enable utilities to communicate wirelessly with home energy systems, are being criticized for invading home owners' privacy and, in some cases, starting fires.
The top news stories for August 20, 2014.
James Bamford's one-on-one interview with Edward Snowden.
The top news stories for August 14, 2014.
The Blackphone, a smartphone offering encrypted communications (phone calls, browsing, email, text), made headlines at last week's DEF CON conference in Las Vegas. Unfortunately, most of those headlines were inaccurate.
Whether your organization is embracing a BYOD or a CYOD program, ulitmately what are most important are the steps you take to secure company data. Here are some steps on how to do just that.