BYOD has brought sweeping changes to the enterprise over the last several years. Nowhere is this more apparent than sitting at the head of IT Security in the role of CISO. Having served in this role at companies like Disney, TiVo and Salesforce during this pivotal time, I can say that it’s an interesting seat to have.
Security Needs to Better Protect Automated Telephone Systems
December 27, 2013
With break ins of enterprise computer networks grabbing the headlines, there is a chance that chief security officers at some corporations and government agencies could be neglecting the lowly office phone. And that may be a costly mistake.
In a special report to the Security magazine Blog, IBM has unveiled the eighth annual IBM 5 in 5, a list of innovations that have the potential to change the way people work, live and interact during the next five years.
Edward Snowden may have the reputation as the most infamous insider threat in recent history, but he’s not the only one who used his job and company resources to commit a crime. Learn why insider threat programs are necessary to allow the organization to prevent, detect, respond to and deter insider threats. Also in this issue: how security professionals can prevent workplace bullying, how mass notification is becoming part of the essential infrastructure of enterprises, and much more!