Tag: access controls

Policy-Driven Network Configuration Management Critical to Network Security

(Originally published in Information Week ) Manual processes to managing device configurations often create gaping security holes! Today’s enterprises face unprecedented cyber-security threats. New breed of cyber-attacks are constantly evolving even as enterprises continue to bolster their defenses

6 mobile security screw-ups you’re (probably) guilty of

In two weeks, the security community will flock to San Francisco for this year’s RSA Conference. With two-thirds of Internet users now accessing the Internet via their mobile devices daily and mobile malware reportedly  up over 185 percent in 2012 , the hottest topic on the docket is mobile security