Feeds

What happens when users are left to their own devices?

The changing shape of practices

  • alert
  • submit to reddit

SANS - Survey on application security programs

Broadcast It's clear that there are fundamental changes happening in the way people, and businesses, want to work. The relentless pace of technology developments has given us ever better and more connected notebooks, and now smartphones and tablets. This means we can work wherever and whenever it suits.

That's all well and good, but just because the devices and technology allow us to work more flexibly doesn't just magically make it effective. Allowing users with technology to develop with a free reign is just as likely to end in chaos and confusion rather than order, productivity and effectiveness.

It's been difficult enough to galvanise people and organise them into teams with them working closely together. Having them far apart brings a whole set of management and psychological issues to the table. Too often companies don't recognise the importance of the human factors and expect the IT department to be able to sort out what is a business problem with IT systems and budgets. What is it that companies need to do to turn the mess into success?

Fortunately, on November 24th at 11:00 GMT we have a live broadcast that aims to piece together useful solutions to this pressing subject. El Reg broadcast editor Tim Phillips asks Tim Stone from Cisco and Andrew Buss from Freeform Dynamics to show us their blueprints.

We would love you to share your experiences in this area via our on-going live Q&A window. Together we are sure to come up with a practical evaluation on how to achieve the flexibility that’s needed in your business’ IT department.

Sound interesting? Good, you can join us for this free event right here.

SANS - Survey on application security programs

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.