Cloud services are being adopted increasingly by organizations. But with adoption comes increased concern, says Symantec's Francis deSouza. How can organizations deploy cloud security to protect their data?
Apple's introduction of its third iteration of the iPad e-tablet, coupled with the growing popularity of cloud computing, could lead to new methods of enterprise computing and IT security, Delaware Chief Security Officer Elayne Starkey says.
A network of cancer hospitals that has relied heavily on laptop computers for clinicians accessing electronic health records is phasing in iPads and iPhones. Learn what steps it's taking to mitigate the security risks involved.
Implementing a mobile device management system is critical for ensuring the security of patient information. But what questions should organizations ask mobile device management vendors to ensure they pick the right system?
Mobile security is a new discussion track at RSA Conference, but it's long been a hot topic for CISOs. Entrust's Dave Rockvam discusses BYOD and how organizations are securing personally-owned devices.