Get a Pentest and security assessment of your IT network.

News

How to have BYOD and security, too

Roger Grimes: BYOD will require a different security framework than traditional computing. The framework is intended to help companies assess the relative risks of BYOD hardware and the level of access they should have to different types of data. It’s my hope that this framework will (at least partially) satisfy the “never say manage” BYOD believers, as well as folks like me who believe managed devices will always play a role. At Microsoft, we consider the device and its security, session origination location, identity/authentication, and the data/service/application being accessed.”]

Source: https://www.csoonline.com/article/2617762/how-to-have-byod-and-security–too.html

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

BlackEnergy exploits recently fixed flaws in Siemens WinCC

News

Google Chrome will block code injection from third-party software within 14 months