Half Sized Blog Element (Single Author Style)

Half Sized Blog Element (Multi Author Style)

2nd Annual Trusted Computing Conference

The 2nd Annual NSA Trusted Computing Conference & Exposition, hosted by the National Security Agency, taking place 20 -22 September in Orlando, FL is just around the corner. This year’s conference presents the theme, “Using COTS Technologies to Deliver Decisive Defensive Advantage.” Join senior executives and IT security thought leaders from government, industry and academia, and be a part of the discussions about the security of vital data, networks and critical enterprise applications.

Mobile Security eSymposisum – LIVE next Thursday

To safeguard mobile devices used by business executives, the data stored on them and the connectivity to corporate networks they enable is a constant trial – one that is infrequently satisfactorily remedied. This is leaving many security pros comparing themselves to Sisyphus rolling a giant boulder up a steep hill over and over. The difference: mobile security troubles only grow heavier. Not only are smartphones, tablets and other devices now ubiquitous, they’re often brought from home. So, just how are companies supposed to secure these things – some private, some corporate-issued? How can such a heterogeneous environment be centrally managed and safeguarded? What about all those applications end-users keep downloading? What about the data they want to download on them? Any legal ramifications? How does the company stay compliant? We’ll provide some answers.

2nd Annual Trusted Computing Conference

The 2nd Annual NSA Trusted Computing Conference & Exposition, hosted by the National Security Agency, taking place 20 -22 September in Orlando, FL is just around the corner. This year’s conference presents the theme, “Using COTS Technologies to Deliver Decisive Defensive Advantage.” Join senior executives and IT security thought leaders from government, industry and academia, and be a part of the discussions about the security of vital data, networks and critical enterprise applications.

Mobile Security eSymposisum – LIVE next Thursday

To safeguard mobile devices used by business executives, the data stored on them and the connectivity to corporate networks they enable is a constant trial – one that is infrequently satisfactorily remedied. This is leaving many security pros comparing themselves to Sisyphus rolling a giant boulder up a steep hill over and over. The difference: mobile security troubles only grow heavier. Not only are smartphones, tablets and other devices now ubiquitous, they’re often brought from home. So, just how are companies supposed to secure these things – some private, some corporate-issued? How can such a heterogeneous environment be centrally managed and safeguarded? What about all those applications end-users keep downloading? What about the data they want to download on them? Any legal ramifications? How does the company stay compliant? We’ll provide some answers.