Most Recent Blogs

Can the FIDO Alliance Act as a Game-Changer and Help Obsolete User Name/Password Authentication?

Posted: February 14, 2014   /   By: Jon Oltsik   /   Tags: IBM, Apple, Microsoft, End-User Computing, Information and Risk Management, mobile, Security and Privacy, Security, google, Lenovo, endpoint security, mobile device, multi-factor authentication, RSA Security, Facebook

It seems like yesterday when I was logging onto the VAX system at my alma mater UMass so I could work on a market research project with a statistics program. When my time slot came up, I would sit in front of a VT100 terminal, input my username and password, and voila – a timesharing session at the cutting-edge of high tech.

Well this memory may seem recent but in truth it was back in the mid-1980s. I probably had a mullet and was hankering to listen to Flock of Seagulls at the time. The VAX, mullet, and new wave music are now ancient history but we’re still using user names and passwords for authentication most of the time.

Read More

Businesses Report Significant Use of Desktop Virtualization Technology

Posted: November 12, 2013   /   By: Mark Bowker   /   Tags: Cloud Computing, End-User Computing, Endpoint & Application Virtualization, endpoint, mobile, mobile device, desktop virtualization, migration

Desktop virtualization is an alternative PC delivery model in which applications, operating systems, user data, profiles, and/or entire end-user environments are encapsulated and delivered to or executed on a remote endpoint device. The various desktop virtualization delivery models allow for centralized management, hosting, and/or execution, as well as syncing capabilities that enable local execution on an endpoint device.

Read More

BYOD Security Gotchas

Posted: May 30, 2012   /   By: Jon Oltsik   /   Tags: Cisco, Information and Risk Management, Security and Privacy, Security, BYOD, endpoint security, android, Juniper Networks, NAC, mobile device, CISO, Extreme Networks, iPad, Enterasys

I've spent a fair amount of time lately on BYOD (Bring Your Own Device), mobile devices, and related issues around information/cyber security. Yes, we are still firmly in the hype cycle but some mobile device security patterns are starting to emerge.

Read More

Mobile Device Security Reality

Posted: March 30, 2012   /   By: Jon Oltsik   /   Tags: Information and Risk Management, endpoint, Security and Privacy, BYOD, mobile device, consumerization of IT

You've heard the same things I have: "You can't control mobile device proliferation." "Most large organizations are being forced to create BYOD programs." "You need to let new employees work with their own devices and use social networking sites if you want to recruit them."

Read More

Posts by Topic

see all