We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Statement.

Filter By:

Type

Topic

Recent Blogs & Podcasts

Insights Portal

\ Mobility 



August 8, 2018 | Mobile Client Devices
By Aaron Turner, IANS Faculty

 Create a Practical Mobile Security Roadmap

Mobile devices in the enterprise are simply a given today. So why are they so difficult to secure? In this report, IANS Faculty Aaron Turner provides some key insights into the true risk of top mobile platforms like Apple iOS and Google Android, and offers practical strategies for properly managing and securing them.

Read More »


May 24, 2018 | Security Policies and Strategy
By Aaron Turner, IANS Faculty

 OTT Messaging Apps: Know the Risks

Over-the-top (OTT) messaging apps like WhatsApp and WeChat claim to offer top-notch privacy and security, but are they enterprise-ready? In this Ask-an-Expert written response, IANS Faculty Aaron Turner says that while such apps are actually more secure than email, they do have their downsides. He offers his recommendations, along with caveats around device, compliance and data retention.

Read More »


April 24, 2018 | Security Policies and Strategy
By Aaron Turner, IANS Faculty

 Set Optimal Policies for Securing NLP Devices

Consumer digital assistants (CDAs) that use natural language processing (NLP) are proliferating, but are Alexa and Siri safe for the enterprise? In this Ask-an-Expert written response, IANS Faculty Aaron Turner details why CDAs are not enterprise-ready and should not be allowed on corporate networks, but he does offer some rules of thumb for creating enterprise-ready NLP solutions. 

Read More »


March 22, 2018 | Mobile Client Devices
By Aaron Turner, IANS Faculty

 Android vs. iOS: Which Is More Secure?

Deciding whether Android or iOS devices are more secure for a corporate environment is difficult because the underlying platforms are in constant flux. In this Ask-an-Expert written response, IANS Faculty Aaron Turner says both can be secure if their OS is kept up to date, but Android 7 has a slight advantage – at least at this point in time.

Read More »


January 18, 2018 | Mobile Access and Device Management
By IANS Faculty, IANS Faculty

 Balance Security and Usability with Mobile Passcodes

When it comes to mobile device passcodes, organizations constantly search for a happy medium between security and usability. In this Ask-an-Expert live interaction, IANS Faculty Justin Wilder details the various options and recommends allowing less complex passwords and Touch ID access, but also adding compensating controls to ensure data stays safe. 

Read More »


January 12, 2018 | Vulnerability Assessment and Management
By Dave Kennedy, IANS Faculty

 Meltdown and Spectre: What to Do Now

The recently revealed Meltdown and Spectre chip vulnerabilities are leaving many security organizations scrambling to get a fix in place. In this Ask-an-Expert live interaction, IANS Faculty Dave Kennedy explains how attackers can leverage the flaws and why certain devices are more vulnerable than others. He also recommends taking a risk-based approach to patching them.

Read More »


November 28, 2017 | Mobile Access and Device Management
By Aaron Turner, IANS Faculty

 Balance Remote Worker Security and Privacy

Managing remote workers can be difficult, especially when looking to balance security with worker privacy. In this Ask-an-Expert written response, IANS Faculty Aaron Turner recommends relying on a combination of configuration and endpoint management along with strict guidelines for employee consent.

Read More »


November 21, 2017 | Mobile Client Devices
By Aaron Turner, IANS Faculty

 Best Practices in Drone Security

Drones offer a cost-effective way to perform tasks like remote monitoring and equipment inspections, but how secure are they? In this Ask-an-Expert live interaction, IANS Faculty Aaron Turner provides an overview of the market and offers tips for ensuring drones don't adversely impact your security posture.

Read More »