The Risks of Consumerization of IT
We often talk about consumerization of IT. The advantages are huge – and so are the risks. The key challenge is, that we increasingly started to rely on devices built for consumers to safeguard our...
View ArticleHow to manage “Bring your own device”
A few years back a customer’s CSO left the room when I said that this customer should start thinking about a scenario, where selected users bring their own devices – he called me “nuts”. Well, I think...
View ArticleConsumerization of IT–How to address this
Bring Your Own Device or Consumerization of IT are fairly hot themes in a lot of customer organizations. When I talk to customers, there are typically different reactions, once we bring this up. Some...
View ArticleConsumerization of IT
In the meantime I guess that most of us agreed that Consumerization of IT or Bring Your Own Device or how ever you want to call this will become a reality – probably rather sooner than later. In the...
View ArticlePaper: Information Protection and Control (IPC) in Office 365 Preview with...
As you know, protecting your information in the cloud is key. We just published a paper called Information Protection and Control (IPC) in Office 365 Preview with Windows Azure AD Rights Management....
View ArticleNew Consumerization of IT Test Lab Guide: Hyper-V Windows 8 corporate virtual...
Our friends in France are currently working intensively on Test Lab Guides for Consumerization of IT. The next one was just released: New Consumerization of IT Test Lab Guide: Hyper-V Windows 8...
View ArticleSecurity Lessons from Star Wars
Exactly the right article for a weekend: May the (En)Force(ment) Be With You – Security Lessons from Star Wars From applying security policies to DLP and effective user authentication, there are many...
View ArticleAre we sitting on a time bomb?
I just read another of these studies: Enterprises sitting on security time bomb as office workers compromise company data. Let’s briefly look at the findings first: 38% of U.S. office workers admit to...
View ArticleIs Anti-Virus Technology Dead?
To start with the way I look at the answer of the question above: Yes, I think so. Basically, when you talk with people knowing the industry, the classical signature-based approach never even worked....
View ArticleMicrosoft Outlook for Android and iOS – what did the developers think?
I would love to use this cool mail app – really. One of the pain points since moving away from Windows Phone (to me definitely the best phone on the market with too many apps missing) is finding a good...
View ArticleTop 15 Security Predictions for 2016
No, they are still not coming from me but this article is actually really interesting: Top 15 security predictions for 2016. A few of them are remarkable: At your criminal service (Kaspersky/Seculert)...
View ArticleTime for Adobe Flash is more than over
The initial security discussion was all about browsers: Which one shows less vulnerabilities, which one is more secure? There were even government agencies in Europe recommending the use of a...
View ArticleFintech & Cyber Showcase 2016
Startups in the Fintech and Cyber area have the potential to really disrupt the business and the way we do security. Therefore, we decided to support the Fintech & Cyber Showcase 2016 – Israel...
View ArticleCriminals getting closer to State Actors
A few years ago, we saw a clear difference between state actors and criminals looking at the technologies and procedures they applied attacking an environment. Over time we have seen these two groups...
View ArticleEight Essentials for Hybrid Identity
It is not new, that identity will become your new perimeter, your next control pane. Still I see a lot of companies struggle with the concept and with the feeling to have the identity in the Cloud....
View Article
More Pages to Explore .....