Quantcast
Channel: Consumerization of IT – Roger Halbheer on Security
Browsing all 15 articles
Browse latest View live

The Risks of Consumerization of IT

We often talk about consumerization of IT. The advantages are huge – and so are the risks. The key challenge is, that we increasingly started to rely on devices built for consumers to safeguard our...

View Article



How to manage “Bring your own device”

A few years back a customer’s CSO left the room when I said that this customer should start thinking about a scenario, where selected users bring their own devices – he called me “nuts”. Well, I think...

View Article

Consumerization of IT–How to address this

Bring Your Own Device or Consumerization of IT are fairly hot themes in a lot of customer organizations. When I talk to customers, there are typically different reactions, once we bring this up. Some...

View Article

Consumerization of IT

In the meantime I guess that most of us agreed that Consumerization of IT or Bring Your Own Device or how ever you want to call this will become a reality – probably rather sooner than later. In the...

View Article

Image may be NSFW.
Clik here to view.

Paper: Information Protection and Control (IPC) in Office 365 Preview with...

As you know, protecting your information in the cloud is key. We just published a paper called Information Protection and Control (IPC) in Office 365 Preview with Windows Azure AD Rights Management....

View Article


Image may be NSFW.
Clik here to view.

New Consumerization of IT Test Lab Guide: Hyper-V Windows 8 corporate virtual...

Our friends in France are currently working intensively on Test Lab Guides for Consumerization of IT. The next one was just released: New Consumerization of IT Test Lab Guide: Hyper-V Windows 8...

View Article

Image may be NSFW.
Clik here to view.

Security Lessons from Star Wars

Exactly the right article for a weekend: May the (En)Force(ment) Be With You – Security Lessons from Star Wars From applying security policies to DLP and effective user authentication, there are many...

View Article

Image may be NSFW.
Clik here to view.

Are we sitting on a time bomb?

I just read another of these studies: Enterprises sitting on security time bomb as office workers compromise company data. Let’s briefly look at the findings first: 38% of U.S. office workers admit to...

View Article


Image may be NSFW.
Clik here to view.

Is Anti-Virus Technology Dead?

To start with the way I look at the answer of the question above: Yes, I think so. Basically, when you talk with people knowing the industry, the classical signature-based approach never even worked....

View Article


Microsoft Outlook for Android and iOS – what did the developers think?

I would love to use this cool mail app – really. One of the pain points since moving away from Windows Phone (to me definitely the best phone on the market with too many apps missing) is finding a good...

View Article

Top 15 Security Predictions for 2016

 No, they are still not coming from me but this article is actually really interesting: Top 15 security predictions for 2016. A few of them are remarkable: At your criminal service (Kaspersky/Seculert)...

View Article

Time for Adobe Flash is more than over

 The initial security discussion was all about browsers: Which one shows less vulnerabilities, which one is more secure? There were even government agencies in Europe recommending the use of a...

View Article

Fintech & Cyber Showcase 2016

 Startups in the Fintech and Cyber area have the potential to really disrupt the business and the way we do security. Therefore, we decided to support the Fintech & Cyber Showcase 2016 – Israel...

View Article


Criminals getting closer to State Actors

A few years ago, we saw a clear difference between state actors and criminals looking at the technologies and procedures they applied attacking an environment. Over time we have seen these two groups...

View Article

Eight Essentials for Hybrid Identity

It is not new, that identity will become your new perimeter, your next control pane. Still I see a lot of companies struggle with the concept and with the feeling to have the identity in the Cloud....

View Article

Browsing all 15 articles
Browse latest View live




Latest Images