Security

Enabling Mobility While Protecting Corporate Data

Blog Series: IT Perspectives by Jaqui Lynch Mobile Devices For the past three days I have been in upgrade turmoil. There are two people in this house and between us we have three desktops, four laptops, two IPADs, two iPhones and2 iPods. All of these need upgrading at...

Endpoints: The Beginning of Your Defense

Contributor: Charles Kolodgy, Senior Security Strategist, IBM The term endpoint conveys a terminus — the end of the journey. However, for IT endpoints, be they computers, mobile devices, servers, point-of-sale terminals or a myriad of other devices belonging to the...

Strategies for Securing Your Business – Part III

Blog Series: IT Perspectives by Jaqui Lynch Exploring QRadar In my previous blogs, Strategies for Securing Your Business – Part I & II, I talked about some of the new roles in security along with some of the things to think about with respect to security including...