Spend an hour with mobile security pioneer Malcolm Harkins, chief security and privacy officer at Intel, as he answers direct questions from attendees about how to get the most from your mobile security efforts.
Attendees had the opportunity to submit questions directly to Harkins. Among the topics he...
The implementation of IPv6, the new Internet communications protocol, will have a major impact on identity and access management. EMC researcher Davi Ottenheimer explains how organizations should prepare.
Having the right log and access management tools in place - and not all tools are used by all agencies at all times - doesn't mean that the proper authorities are alerted in a timely manner to activities that could jeopardize the nation's security.
John Houston, CISO at University of Pittsburgh Medical Center, is keeping his eye on emerging threats, including the risks tied to medical devices linked to networks and the potential for DDoS attacks to spread to healthcare.
At the outset of the BYOD trend, mobile security was about protecting devices. Today, mature organizations are focused more on protecting data and ensuring proper identity and access management.
In this exclusive session, a sequel to Mobile: Learn from Intel's CISO on Securing Employee-Owned Devices, Malcolm...
The OMB and Federal CIO Council have released the Federal Identity, Credential and Access Management (FICAM) roadmap to give public agencies the direction they need to create trust across all boundaries: organizational, operational and physical.
Join Sr. Technical Architect Pamela Dingle, of Ping Identity, as she...
A key component of most information security strategies is robust identity and access management (IAM). So how can IT extend this same security to a mobile workforce with personalized, won't-use-anything-else smartphones and tablets?
It's time to extend the same controls you have on the desktop to mobile users....
Beyond mobile device and data security, what are the ID and access challenges facing security leaders - and how are cutting-edge organizations tackling them? CSOs Elayne Starkey and Malcolm Harkins share tips.
Business line managers are in better positions to control and monitor network and system access privileges than IT departments, since they know their employees and the privileges they should be provided, says Bill Evans of Dell Software.
Because managing identities is a global problem, it requires a global solution, says Paul Simmonds of the Jericho Forum. A new organization has been established to address global identity. Simmonds offers insight.