Firewalls and intrusion detection systems won't be adequate to contend with the potential cyberthreats involved in using cloud services and mobile devices, writes Jerry Irvine, chief information officer of Prescient Solutions. Enterprises must classify their data and implement service-level agreements with their cloud providers, he recommends. Having clear bring-your-own-device policies and using mobile application management and mobile data management software are also key, according to Irvine.

Full Story:

Related Summaries