Comments
A Peek Inside Enterprise BYOD App Security Policies
Newest First  |  Oldest First  |  Threaded View
Kelly Jackson Higgins
50%
50%
Kelly Jackson Higgins,
User Rank: Strategist
6/4/2014 | 7:33:06 AM
Re: A Peek Inside Enterprise BYOD App Security Policies, by Kelly Jackson Higgins
It was interesting to see the data on the breakdown and types of apps IT is pushing to users' mobile devices. And it was promising to see that some really are starting to protect corporate data access. IBM's Dale said he was surprised to see Cisco AnyConnect show up as a popular public app, mainly because there are ways to streamline the VPN connection within apps. I thought it seemed promising to have IT pushing a VPN app.
James ArnoldW608
50%
50%
James ArnoldW608,
User Rank: Apprentice
6/3/2014 | 5:50:15 PM
A Peek Inside Enterprise BYOD App Security Policies, by Kelly Jackson Higgins
A very good analysis of the security challenge with BYOD.  Imagine "one" piece of data going  through such a multitude of authentication and verification procedures, without being altered in some way.  http://www.darkreading.com/endpoint/a-peek-inside-enterprise-byod-app-security-policies/d/d-id/1269404?_mc=sm_dr


Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-1955
Published: 2015-08-03
IBM MQ Light before 1.0.0.2 allows remote attackers to cause a denial of service (CPU consumption) via a crafted byte sequence in authentication data.

CVE-2015-1956
Published: 2015-08-03
IBM MQ Light before 1.0.0.2 allows remote attackers to cause a denial of service (disk consumption) via a crafted byte sequence in authentication data, a different vulnerability than CVE-2015-1958 and CVE-2015-1987.

CVE-2015-1958
Published: 2015-08-03
IBM MQ Light before 1.0.0.2 allows remote attackers to cause a denial of service (disk consumption) via a crafted byte sequence in authentication data, a different vulnerability than CVE-2015-1956 and CVE-2015-1987.

CVE-2015-1970
Published: 2015-08-03
The IBM WebSphere DataPower XC10 appliance 2.1 through 2.1.0.3 and 2.5 through 2.5.0.4 retains data on SSD cards, which might allow physically proximate attackers to obtain sensitive information by extracting a card and attaching it elsewhere.

CVE-2015-1987
Published: 2015-08-03
IBM MQ Light before 1.0.0.2 allows remote attackers to cause a denial of service (disk consumption) via a crafted byte sequence in authentication data, a different vulnerability than CVE-2015-1956 and CVE-2015-1958.

Dark Reading Radio
Archived Dark Reading Radio
What’s the future of the venerable firewall? We’ve invited two security industry leaders to make their case: Join us and bring your questions and opinions!