5 Mobile Security Lessons From the Department of Defense
by Jason Bloomberg | September 26, 2012 | cio.com
Several years ago, the National Security Agency wasted millions on a circuit-switched approach to mobile security strategy. With help from the Department of Defense, the NSA is doing things differently now. Enterprise CIOs can learn a few things from the effort, too.
Emotional, physical cost of workplace bullying
By Andreas Dorn | September 28, 2012 | nst.com.my
SYSTEMATIC DESTRUCTION: It jeopardises health, career and the job once loved by the victim
Claim of iPhone hacking raises questions about FBI data
by Ken Dilanian and Salvador Rodriguez | September 5, 2012 | latimes.com
A hacker group says it obtained millions of identification numbers from iPhones, iPads and other devices from an FBI laptop. The agency denies having the data.
Shifty, but secure eyes
by Inderscience | August 29, 2012 | alphagalileo.org
A biometric security system based on how a user moves their eyes is being developed by technologists in Finland.
10 Tips For Protecting Mobile Users
by Ericka Chickowski | August 27, 2012 | darkreading.com
Mobile employees, devices, and data need protecting. Here are 10 tips to make it happen.
Tech Insight: Speeding Up Incident Response With Continuous Monitoring
by John H. Sawyer | July 20, 2012 | darkreading.com
Increase speed and effectiveness of incident response through continuous monitoring and enterprise IR tool integration
Higher retail wages correlate with lower levels of employee theft
by L. Brian Stauffer | July 30, 2012 | phys.org
A study co-written by a University of Illinois business professor shows that higher wages are associated with lower levels of employee theft, shedding light on the impact that compensation practices have on shaping employee honesty and ethical norms in organizations.
10 Ways Enterprises Can Battle Malware
by Information Security Media Group | July 26, 2012 | govinfosecurity.com
As malicious code rapidly evolves, the National Institute of Standards and Technology is updating its guidance to reflect changes in the threat malware presents organizations.