We often talk about consumerization of IT. The advantages are huge – and so are the risks.
The key challenge is, that we increasingly started to rely on devices built for consumers to safeguard our company’s – or even worse our country’s – secrets. Consumerization is huge and makes a lot of sense from a . . . → Read More: The Risks of Consumerization of IT
You might know the problem if you are working in consulting: You have to fill out the report, form whom you spent your time. And then you forgot to fill in the tool and all of a sudden you have a hard time figuring out where you have been.
There is a revolution: iPhone solves . . . → Read More: iPhone saves you the trouble of reporting your working time
I just read this article on Google pulling 50 applications from their Android marketplace (Google uses remote delete to remove Android apps from smartphones – Update). A very good decision as these apps leverage an exploit to access user data.
However, what made me think is that they removed the applications from the devices. This . . . → Read More: Is Remote-Application-Removal Acceptable?
I am definitely looking forward to the collaboration Nokia/Microsoft and it seems to have gotten quite some chatter on the web. Interestingly, F-Secure looked into it as well: They looked at the app-model and the sandboxing technology in Windows Phone 7 and concluded (as we do as well) that malware on Windows Phone 7 is . . . → Read More: Security Impact of the Nokia/Microsoft Announcement
That’s absolutely great and worth spending the few minutes – enjoy:
I am preparing the worldwide Chief Security Advisor meeting in Seattle, which takes place soon. I am doing at in the Swiss Alps. Isn’t fall in the Alps great?
That’s the power of home office
. . . → Read More: Security in Switzerland