
|
Enough to make your pulse soar
Imagine this: employers monitoring programmers' pulses, eye movements and even anxiety levels to detect when they could be in trouble. It may soon be a reality |  |
Time to halt the torrent
Stopping data leakage requires a robust chain of custody, with a high level of security, auditability and transparency |
 |
PSN-compliant mobile working
A PSN-compliant mobile working solution offers tangible benefits, but it is critical to enter into the process with a robust strategy, cautions Tim Ager of Celestix
|
 |
Inside the criminal mind
Infoblox has launched a whitepaper that takes a sideways look at DNS security from the perspective of a cybercriminal
|
MORE COMPUTING SECURITY AWARDS WINNERS |
|
DLP Solution of the Year
WINNER: CoSoSys - Endpoint Protector 4 Roman Foeckl and Carmen Oprita were presented with the trophy on behalf of CoSoSys
|
|
|
|
|
Welcome to the January 2015 Newsletter.
This is the time of year when all of the predictions for the 12 months ahead come pouring out of the cupboard. At Computing Security, I've seen a plethora of future-gazing commentary. Discarding the more 'out there' forecasts, here is a taster of what may (or may not) be heading your way in the months to come.
There will be more emphasis on serving the needs of the mobile user this year, which will be the year of the enterprise mobile applications. 2015 will also see the beginning of the downward spiral of the public cloud hype cycle, based on the security breaches that have occurred recently. And, of course, there is the latest biggie, 'Wearable Technology'. The word is that wearables will find their first footing in the enterprise, which will alter the way companies look at BYOD device policies and solutions.
For more comprehensive coverage of what may be heading your way, you will need to see the next issue of the magazine. If you haven't signed up yet, you can do so at the end of this column.
To make sure you get your copy of the Newsletter emailed to you personally, every time, click here to register.
Brian Wall, Editor
Computing Security
Follow us :
|
|