Get a Pentest and security assessment of your IT network.

News

How to have BYOD and security, too

Roger Grimes: BYOD will require a different security framework than traditional computing. The framework is intended to help companies assess the relative risks of BYOD hardware and the level of access they should have to different types of data. It’s my hope that this framework will (at least partially) satisfy the “never say manage” BYOD believers, as well as folks like me who believe managed devices will always play a role. At Microsoft, we consider the device and its security, session origination location, identity/authentication, and the data/service/application being accessed.”]

Source: https://www.csoonline.com/article/2617762/how-to-have-byod-and-security–too.html

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

Take note, next week update Adobe Reader and Acrobat to fix critical flaws

News

Linux bug leaves 1.4 billion Android users vulnerable to hijacking attacks