InfoWorld just released a special report on "liquid computing" - that is, executive editor Galen Gruman's newly-coined term for computing that revolves around a personal cloud rather than a specific primary device. The report featured articles from Gruman as well as 2014 Security Change Agents contributors Paul Roberts and Fahmida Rashid.
Liquid computing adoption is clearly on the rise, and the report gives us a lot to think about. On one hand, a computing experience where all data and preferences are centralized in a way that is not bound by device has tremendous potential for end users in terms of productivity and ease of access. On the other, the personal cloud and all connected devices must be secured to prevent adding significant risk of sensitive data being exposed.
Our CTO Salo Fajer weighs in on one of the top concerns for CISOs today - securing data that frequently moves between the cloud and devices:
Companies want to be able to control and audit those movements and enforce policies around them. Who can open what and where.
There's quite a bit more from Salo in Paul Roberts' article on DRM, and the whole report offers some great insights on data protection, cloud and mobile security, and the impact of liquid computing on regulatory compliance. You can view the full report here.
Data-Centric Security: Why You Need it, How to Get Started
Forrester VP and Principal Analyst John Kindervag explains the fundamentals of a data-centric security approach, why you need it, and how to get started. Watch the webinar on demand.
Related ArticlesThe Evolving Managed Security Model
Hybrid Managed Services Offer the Best of Both Worlds for Security DeploymentsResources, Budget Remain An Issue for DPOs
In a recent survey, data protection officers cited a lack of budget and cohesion across all business units when it comes to developing an organization-wide data protection and privacy strategy as some of the role's top challenges.Security Investments and the Definition of Insanity
A survey of IT professionals finds companies continuing to prioritize network perimeter protections – with little to show for it.