Mobile insecurity ... Protecting legacy systems ... Help with security rollouts
In our feature story this month, Daniel Miessler, security consultant with Hewlett-Packard, discusses mobile vulnerabilities, including the risks associated with easy physical access to mobile devices, heavy use of wireless service at the same time and in the same place, and location-aware applications. He also addresses the three principal attack surfaces -- the device, the network and the server components -- and urges greater mobile defense.
One of our readers needs to secure his organization's legacy systems. Do readers have any suggestions on how to best shore up these systems?
Wondering how to successfully manage a security rollout? In this month's best advice column, readers provide numerous suggestions on how to implement security planning across your organization.
Let us know how successful we are at including articles relevant to you, by taking a one-minute reader survey. You could win a T-shirt for answering the survey or this month's dilemma or for submitting a business challenge you face.
If you would like to unsubscribe from this newsletter, please click on link at the bottom of the page.