Feeds

Protecting users from themselves

Because yesterday's security doesn’t work

  • alert
  • submit to reddit

Using blade systems to cut costs and sharpen efficiencies

Live Now! ‘“The problem with making things foolproof is that we keep evolving a better class of fool”, as the old saying goes. And nowhere is this more true than in security where breaches remain regular and commonplace despite all the investment that has gone into it.

Part of the problem is that we expect users to be experts in security, when in reality what they want to do is be successful in their job and will hunt out ways to make this happen. If security gets in the way, there will be a workaround. New devices and services give users much more to choose from, and more problems for IT to solve.

Getting to grips with this is vital, because the increased risk is holding many businesses back from working more flexibly, getting closer to customers and having more integration with partners and supply chain. But it’s clear, we need to be thinking of the bigger picture when it comes to protecting users from themselves.

Live today (18:00 GMT and 10:00 PST), we have an audiocast with experts talking about just these issues, in the hope of getting to the heart of the problem of securing end users and protecting them from their own actions. Tim Phillips from The Register is your host and he's joined by analyst Andrew Buss from Freeform Dynamics and Chris Boyd from GFI.

The program today is taking a road through the following topics, each of which will be considered in turn and giving examples of best practice where possible:

• An overview of the situation

o The changing face of end user computing

o Emerging risks

o Impact on the business

• Why security is not working

o Rising costs and continuing breaches

o Sensitive information contained on many devices

o User behaviour

• Protecting users

o What is realistic to expect

o Can training help?

o Monitoring and enforcing policy

We’re aiming to provide lots of real world context using examples of how customers in the real world are addressing these matters. Join us today and share your experiences too, through a live Q&A, and get answers to any questions you may have.

The event is free and you can register now. ®

The smart choice: opportunity from uncertainty

More from The Register

next story
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
NEW, SINISTER web tracking tech fingerprints your computer by making it draw
Have you been on YouPorn lately, perhaps? White House website?
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Black Hat anti-Tor talk smashed by lawyers' wrecking ball
Unmasking hidden users is too hot for Carnegie-Mellon
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.