Feeds

Protecting users from themselves

Because yesterday's security doesn’t work

  • alert
  • submit to reddit

The Power of One eBook: Top reasons to choose HP BladeSystem

Live Now! ‘“The problem with making things foolproof is that we keep evolving a better class of fool”, as the old saying goes. And nowhere is this more true than in security where breaches remain regular and commonplace despite all the investment that has gone into it.

Part of the problem is that we expect users to be experts in security, when in reality what they want to do is be successful in their job and will hunt out ways to make this happen. If security gets in the way, there will be a workaround. New devices and services give users much more to choose from, and more problems for IT to solve.

Getting to grips with this is vital, because the increased risk is holding many businesses back from working more flexibly, getting closer to customers and having more integration with partners and supply chain. But it’s clear, we need to be thinking of the bigger picture when it comes to protecting users from themselves.

Live today (18:00 GMT and 10:00 PST), we have an audiocast with experts talking about just these issues, in the hope of getting to the heart of the problem of securing end users and protecting them from their own actions. Tim Phillips from The Register is your host and he's joined by analyst Andrew Buss from Freeform Dynamics and Chris Boyd from GFI.

The program today is taking a road through the following topics, each of which will be considered in turn and giving examples of best practice where possible:

• An overview of the situation

o The changing face of end user computing

o Emerging risks

o Impact on the business

• Why security is not working

o Rising costs and continuing breaches

o Sensitive information contained on many devices

o User behaviour

• Protecting users

o What is realistic to expect

o Can training help?

o Monitoring and enforcing policy

We’re aiming to provide lots of real world context using examples of how customers in the real world are addressing these matters. Join us today and share your experiences too, through a live Q&A, and get answers to any questions you may have.

The event is free and you can register now. ®

Designing a Defense for Mobile Applications

More from The Register

next story
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.