Information Security Leader, Author, Instructor and Speaker

Default utility Image

Mobile device security policy begins with mobile platform comparison TAGS: Mobility is ubiquitous. You would be hard-pressed to find an organization that does not rely upon mobile devices or smartphones …Continue reading →

Default utility Image

Laptop full disk encryption: debunking the myths TAGS: | | Full disk encryption (FDE) is widely used to control the risk of users travelling with (and losing) portable computers containing …Continue reading →

Default utility Image

Three portable data storage encryption methods TAGS: | Over the past few months, we’ve been exploring different ways to apply encryption to secure confidential business data in a …Continue reading →

Default utility Image

Data encryption methods: securing emerging endpoints TAGS: | These policies made it easy to feel secure about having your sensitive data left in vehicles, travelling through airports and …Continue reading →

Default utility Image

Microsoft NAP/TNC alliance brings new dimension to network access control decisions TAGS: | | Network access control (NAC) systems provide information security teams with a valuable weapon in the endpoint security war. This is …Continue reading →

Default utility Image

Maintaining data security when the employee base goes remote TAGS: My main concern after reading your question concerns data storage: where will your important company data reside? Chances are that …Continue reading →

Default utility Image

Employee-owned handhelds: Security and network policy considerations TAGS: BlackBerrys, iPhones, Treos, iPods and other network-enabled handheld gadgets are now an essential part of our lives. Almost everyone carries …Continue reading →

Default utility Image

Mobile device security in six simple steps TAGS: | | Two thousand six was the year of laptop theft. In February, a laptop was stolen from an Ernst & Young …Continue reading →