The new mobile freedom is germinating a sense of self-reliance in users. Recent controversies such as high-profile privacy leaks of celebrities' photos and similar stories have gained enormous coverage in the press and loom large in mobile users' minds. They see themselves at risk, personally. This is an opportunity for tutelage that users' employers should seize. Better digital hygiene can reduce risks and let a user rest easier. And it can provide IT security directors with a glimmer of light at the end of a very dark tunnel.
December 2014
In this issue:- Mobile Security: Managing the Madness — Opening Statement
- Driving Enterprise Mobile App Usage: Moving from Stuck to Secure, Scalable, Usable -- and Productive
- Mobile's Biggest Threat? It's Not What You Think
- Privacy of Mobile Users: Pitfalls and Recommendations
- Mobile Security from a Practical Perspective
November 2014
The IoT should not be viewed as only a technological opportunity. It has the potential to transform how people and business interact in significant ways. Therefore, people must be placed at the center of the IoT conversation.
In this issue:- The IoT: Technologies, Opportunities, and Solutions — Opening Statement
- The Industrial Internet: The Opportunities ... and the Roadblocks
- Leveraging the Internet of Things: Emerging Architectures for Digital Business
- Architecting for New Business Opportunities in the Internet of Things
- A Comparative Study of Data-Sharing Standards for the Internet of Things
- Thinking About Making Your Product Smart? Keep These 10 Things in Mind
October 2014
As a coach, it can be frustrating to hear someone want to stop the conversation, which is what invoking the 'real world' often does. Yet it's also an indication that the person or group has other issues that are causing them to lose sleep.
Dave Rooney
Guest EditorSeptember 2014
Our decision making appears to improve when we increase awareness and communication about decisions and the principles we're using to make them. Establishing a method and criteria and laying out the alternatives allow us to critique and learn -- both from our successes and from our failures.
Hillel Glazer
Guest EditorAugust 2014
"No matter how large or small our organizations are, we cannot just wash our hands of the data security problem -- there is too much at stake."— Ken Orr, Guest Editor
In this issue:- Data Hacking: No Day at the Breach — Opening Statement
- Leading in the Time of Data Breaches
- Crafting a Secure and Effective BYOD Policy
- The Insider Track on Cyber Security
- The Data Shell Game: The Best Way to Protect Corporate and Institutional Data in the Cloud
- An Architecture Approach to Corporate Information Security