How to Secure Your Mobile Device, In an Unsafe World

You’ve seen the news headlines, “900 Million Android Devices Vulnerable!” Which, at first glance seems pretty shocking — after all, that’s roughly half of all active Android devices. If you are like me though, this kind of news is becoming all too normal. It seems there is always some new hack, exploit or vulnerability. Before this, it was Stagefright – the vulnerability where an attacker could gain control of your device with just an MMS message. When it comes to mobile devices, there is a certain sensitivity. For most of us, if someone is able to gain control of our device,…

Centrify’s Derived Credentials Enables BYOD within the Government

Recently, when I was watching ESPN, it played a humorous bit involving NFL insider Adam Schefter’s kitchen shaking as if experiencing an earthquake, only instead it was just the cumulative rattling and vibrating from his 5 or 6 cell phones on the table. Of course the engineer in me immediately noted the impracticality of someone needing so many smart phones; however, this was not always the case in the early days of mobile computing. I met plenty of IT folks during the late 90’s who carried multiple cell phones and multiple pagers, since this was before true “smart” technology put a…

IoT, the “Illusion of Trust” — Moving Trust from the Network to Users and Devices

Our always on, always connected world has fundamentally changed how businesses operate. Communicating with customers and employees will never be the same again with cloud solutions bringing many benefits by making things easier for businesses, and it’s happening whether we like it or not. But many businesses are placing trust in the cloud like they did for internal networks, without proper consideration for the challenges and deeper issues at hand. The added convenience of cloud applications also comes with a potential downside, such as potential security threats and surrender of control. Many people are familiar with the acronym “IoT,” and…