Ryan Naraine Device or Network David Gewirtz Best Argument: Device 45% 55% Audience Favored: Network (55%) List of Events: Opening Statements Rebuttal Closing Statements The moderator has delivered a final verdict. Opening Statements There’s no other choice Listen, I’m not going to sit here and argue that network security isn’t crucial to a robust mobile risk management strategy. It is. But if you ignore security at the device layer, you’re in for a rude awakening. In this BYOD world, corporate data is flying through open WiFi networks in coffee shops and sitting in the back of taxi cabs when smartphones and tablets get lost. If you can’t protect the device, you are ignoring significant entry points for attackers. The best defense is multi-layered, but unless you have strict plans and policies around device security, identity management, provisioning, log-in credentials, you are ignoring significant risks. When mobile devices leave the traditional “perimeter,” you really need to address that risk at the endpoint level. There’s no other choice. To keep everyone safe Mobile devices, far more than desktop computers, are extensions of the personalities of the individuals using them. Here’s the fundamental problem. If we rely on the device as the… Read full this story
- Environmentalist Bill McKibben on national security implications of climate change
- The US needs a new techno-democratic statecraft: Start with 5G
- Americans have to know the truth about the powers of the president
- Why Nigerian armed forces can’t fight terrorism—Tony Nyiam
- The making of Patrick Mahomes, the highest-paid man in sports history
- Democratic Party Platform: We Fact-Checked the Science
- Buhari backs state, community Police
- 5 reasons why Microsoft is even entertaining a Tik Tok purchase
- How YouTube spreads extremist ideas that inspire events like the Christchurch mosque shootings
- For Black Pop Stans, the Bare Minimum Is No Longer Enough
Mobile security: What's the best defense? have 298 words, post on www.zdnet.com at February 25, 2013. This is cached page on CuBird. If you want remove this page, please contact us.