"With a company-issued device, you can issue a policy that says users have no rights of privacy over information on the device," says Javelin's Tom Wills. But with employee-owned devices? A whole new set of issues.
How can organizations best mitigate risk and meet increasingly stringent compliance requirements in the face of infrastructure transition and pressure to control costs? The answer: Virtual and cloud-based solutions. Unfortunately, these solutions introduce significant challenges with respect to security, audit and...
Securing data in the public cloud isn't much different from other types of IT security. "It's the same advice we give for almost any deployment of IT because it is still the right thing to do," NIST Senior Computer Scientist Tim Grance says.