Enterprise mobile security: A proactive approach to protecting data


For many people, the line between work and personal life is blurred.

When it comes to mobile devices, 80% of the workforce admits to using their devices for both business and private use, which means personal data and company data will naturally converge onto a single device. What’s becoming increasingly important, is how to protect the data stored on and being accessed from these devices to ensure mobile workforce security.

So how much are those corporate emails or family photos worth to...

By SafeNet, 19 May 2016, 0 comments. Categories: Data & Analytics, Data Loss, Enterprise Mobility, Security.

2015 data breaches by the numbers: Still plenty of work to do


By Andrew Gertz, SafeNet

Do you want the good news or the bad news about 2015 data breaches? Truth be told, I’m a realist at heart — but one that wishes he could be an optimist – so let’s start with the good news.

The good

Based on the Breach Level Index (BLI), the total number of data records lost or stolen in 2015 actually decreased by 39% from 2014, the year of mega breaches.

While more...

By SafeNet, 04 March 2016, 0 comments. Categories: Data & Analytics, Data Loss, Security.

Updating your information security strategy: Three tips for CISOs

(c)iStock.com/Pamela Moore

By Eric Hanselman, chief analyst, 451 Research

A new year means time for reflection for many, and thoughtful CISOs have a lot to consider. They’ve been through a lot recently, with increasing DDoS attacks and the quickening drumbeat of breach announcements.

But this is a time to consider more strategic approaches to delivering information security value. It’s critical to make changes that will enable an enhanced security posture in 2016. The IT landscape is changing, and...

By SafeNet, 18 February 2016, 0 comments. Categories: Enterprise Mobility, Identity, Security.

Four ways the IoT will need to evolve to keep us safe

(c)iStock.com/Marcus Lindstrom

By Mor Ahuvia

The motto “Never have so many people known so little about so much” became a hallmark of James Burke’s brilliant BBC TV Series “Connections” back in the 80s and 90s.

To paraphrase Burke in terms of the IoT revolution, never will have so many people entrust so much to companies about whose security practices they know so little.

So what is the Internet of Things anyway?

As defined in...

By SafeNet, 05 November 2015, 0 comments. Categories: IoT, Security.

How two-factor authentication ensures mobile workforce security

(Image Credit: iStockPhoto/kickimages)

Flexible working arrangements offer a win-win solution for employees and their managers.

According to a recent study by Regus, a global provider of business and office space, 72% of global businesses report that increased productivity is a direct result of flexible working practices. 68% of enterprises indicated that flexible...

By SafeNet, 11 August 2015, 0 comments. Categories: Employees, Enterprise Mobility, Security.

Five ways to quickly support enterprise mobile security

(Image Credit: iStockPhoto/Peter Burnett)

All too often, implementing enterprise mobility is seen as an intimidating mammoth project, causing IT professionals to resort to patchy, expedient solutions at best or to completely ignore the call-for-mobility at worst. Security concerns and compliance constraints along with limited IT staffing and budget serve to further push back any mobility-related initiatives.

However, the demand for...

By SafeNet, 03 August 2015, 0 comments. Categories: Authentication, Enterprise Mobility, Security.

2014 data breaches by the numbers - and their impact


A year ago, I was writing about the 575 million data records lost or stolen throughout 2013, a sum based on the data collected by the Breach Level Index that seemed astonishing at the time. The Target breach that happened at the end of that year stood out for me as the epitome of a changing infosec landscape, in which a breach not only caught the attention of industry experts, but also warranted weeks of mainstream media...

By SafeNet, 12 February 2015, 0 comments. Categories: Authentication, Privacy, Security.

Intelligent enterprise IT security: Lessons from David vs Goliath

By Prakash Panjwani

Malcolm Gladwell, famous for his New Yorker articles and now iconic book The Tipping Point, released a book last fall titled David and Goliath. The book is primarily about underdogs and why they succeed in business and other walks of life. It is a great read and one I highly recommend. A key lesson from the book, which Gladwell

By SafeNet, 29 August 2014, 0 comments. Categories: Enterprise Mobility, Security.