Comments
A Peek Inside Enterprise BYOD App Security Policies
Newest First  |  Oldest First  |  Threaded View
Kelly Jackson Higgins
50%
50%
Kelly Jackson Higgins,
User Rank: Strategist
6/4/2014 | 7:33:06 AM
Re: A Peek Inside Enterprise BYOD App Security Policies, by Kelly Jackson Higgins
It was interesting to see the data on the breakdown and types of apps IT is pushing to users' mobile devices. And it was promising to see that some really are starting to protect corporate data access. IBM's Dale said he was surprised to see Cisco AnyConnect show up as a popular public app, mainly because there are ways to streamline the VPN connection within apps. I thought it seemed promising to have IT pushing a VPN app.
James ArnoldW608
50%
50%
James ArnoldW608,
User Rank: Apprentice
6/3/2014 | 5:50:15 PM
A Peek Inside Enterprise BYOD App Security Policies, by Kelly Jackson Higgins
A very good analysis of the security challenge with BYOD.  Imagine "one" piece of data going  through such a multitude of authentication and verification procedures, without being altered in some way.  http://www.darkreading.com/endpoint/a-peek-inside-enterprise-byod-app-security-policies/d/d-id/1269404?_mc=sm_dr


Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
DevOps’ Impact on Application Security
DevOps’ Impact on Application Security
Managing the interdependency between software and infrastructure is a thorny challenge. Often, it’s a “developers are from Mars, systems engineers are from Venus” situation.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2970
Published: 2014-07-31
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-5139. Reason: This candidate is a duplicate of CVE-2014-5139, and has also been used to refer to an unrelated topic that is currently outside the scope of CVE. This unrelated topic is a LibreSSL code change adding functionality ...

CVE-2014-0914
Published: 2014-07-30
Cross-site scripting (XSS) vulnerability in IBM Maximo Asset Management 6.2 through 6.2.8 and 6.x and 7.x through 7.5.0.6, Maximo Asset Management 7.5 through 7.5.0.3 and 7.5.1 through 7.5.1.2 for SmartCloud Control Desk, and Maximo Asset Management 6.2 through 6.2.8 for Tivoli IT Asset Management f...

CVE-2014-0915
Published: 2014-07-30
Multiple cross-site scripting (XSS) vulnerabilities in IBM Maximo Asset Management 6.2 through 6.2.8, 6.x and 7.1 through 7.1.1.2, and 7.5 through 7.5.0.6; Maximo Asset Management 7.5 through 7.5.0.3 and 7.5.1 through 7.5.1.2 for SmartCloud Control Desk; and Maximo Asset Management 6.2 through 6.2.8...

CVE-2014-0947
Published: 2014-07-30
Unspecified vulnerability in the server in IBM Rational Software Architect Design Manager 4.0.6 allows remote authenticated users to execute arbitrary code via a crafted update site.

CVE-2014-0948
Published: 2014-07-30
Unspecified vulnerability in IBM Rational Software Architect Design Manager and Rational Rhapsody Design Manager 3.x and 4.x before 4.0.7 allows remote authenticated users to execute arbitrary code via a crafted ZIP archive.

Best of the Web
Dark Reading Radio