InfoWorld just released a special report on "liquid computing" - that is, executive editor Galen Gruman's newly-coined term for computing that revolves around a personal cloud rather than a specific primary device. The report featured articles from Gruman as well as 2014 Security Change Agents contributors Paul Roberts and Fahmida Rashid.
Liquid computing adoption is clearly on the rise, and the report gives us a lot to think about. On one hand, a computing experience where all data and preferences are centralized in a way that is not bound by device has tremendous potential for end users in terms of productivity and ease of access. On the other, the personal cloud and all connected devices must be secured to prevent adding significant risk of sensitive data being exposed.
Our CTO Salo Fajer weighs in on one of the top concerns for CISOs today - securing data that frequently moves between the cloud and devices:
Companies want to be able to control and audit those movements and enforce policies around them. Who can open what and where.
There's quite a bit more from Salo in Paul Roberts' article on DRM, and the whole report offers some great insights on data protection, cloud and mobile security, and the impact of liquid computing on regulatory compliance. You can view the full report here.
Data-Centric Security: Why You Need it, How to Get Started
Forrester VP and Principal Analyst John Kindervag explains the fundamentals of a data-centric security approach, why you need it, and how to get started. Watch the webinar on demand.
Related ArticlesJabil Circuit Wins ISE Southeast Project of the Year Award
Global manufacturer Jabil Circuit recognized for their security-as-a-service initiative in the ISE Southeast Executive Forum and Awards 2015.Experts on Top InfoSec Considerations for Financial Services Companies
A panel of infosec and financial services professionals weigh in on the top threats and security priorities for the financial industry.What does GDPR mean for you?
With its enforcement date approaching, here are some key points to consider in preparing your organisation for GDPR compliance.