mobile device management

Information Security Means Never Being Done
Enterprisesecuritymag >> cxoinsights

Dan Callahan, VP, Cloud Services, CGNET

Do you recall the story of Sisyphus? He was the Greek god whose punishment for a life of indiscretions was to roll a boulder to the top of a hill—and then watch as it rolled to the bottom. Managers in charge of information security can...

Headline: 7 Tips and Tools to Protect University Campuses from Cyber Attacks
Enterprisesecuritymag >> cioviewpoint

James Tagliareni, CIO, Washburn University

If you are like me, data security is a top priority. A recent report by the Identity Theft Resource Center shows that data breaches in the United States are occurring at a record pace this year, and that hacking, from phishing attacks, ransomware,...

Balancing Security and Risk in a Cloud- Connected Enterprise
Enterprisesecuritymag >> cxoinsights

Anil Karmel, Founder and CEO, C2 Labs

Organizations are presented with a myriad of choices when determining how to procure, implement, migrate or scale applications to serve an increasingly mobile user base. Users are requesting the same level of agility, flexibility and transparency...