Daily Archives: September 3, 2014



For higher education IT departments, bring your own device (BYOD) is already a reality, whether or not they have specific BYOD policies in place. While in some ways, colleges and universities are better prepared to deal with the BYOD trend than other organizations, the ability to offer device choice without sacrificing control or increasing security risks has become the new measure of success for higher education IT organizations.

Transforming Higher Education with Mobility Solutions


Your business associates know mobile apps are important, and so do you. But that may be the only agreement on mobile apps between business and IT. Bloomberg Audience Insights interviewed 150 senior business decision makers and IT decision makers from large companies with more than 1,000 employees to find out where we agree and where we might disagree on mobile apps. 

Bloomberg Research – Business / IT view of Mobile App ...







Open source software is a game-changer in helping development organization herd their application security risks. But they can also introduce risk when employed without adequate precautions. However, by following a few strategies, your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.

Reducing Security Risks from Open Source Software


The weakest point in modern networking infrastructures is often not the low-level hardware and software running on the servers, but the web applications that are developed and hosted upon them. According to the SANS survey on application security, poor understanding of web security needs on the part of developers also limit the effectiveness of application security programs. 

SANS – Securing Web Applications Made Simple and Scalable