Where’s Your Security Vulnerability: on a Mobile Device or in the Cloud? #TechViews

#TechViews Mobile Security TweetChat 1 PM ET – Tuesday, October 29, 2013  Disruptive trends such as mobility and cloud computing challenge IT security professionals today.

#TechViews Mobile Security TweetChat 1 PM ET – Tuesday, October 29, 2013  techviews

Disruptive trends such as mobility and cloud computing challenge IT security professionals today. They need to secure the data, devices and environments to protect corporate and customers assets while also leaving enough room to enable innovative business services.

CA Technologies next week will host a Twitter Chat delving further into the topic of IT security, specifically addressing how mobility and cloud computing are forcing IT organizations to change their approach to protecting assets, data and privacy. The discussion stems in part from a recent study from CA, “TechInsights Report: Cloud Succeeds, Now What?”, which showed while security was the biggest inhibitor for placing specific applications in the cloud, it was also considered one of the bigger benefits of adopting cloud computing by some.

Stack of mobile telephones

Separately, the issue of secure mobility is also causing much discussion among industry watchers who are recognizing that even with new technologies, IT organizations need to establish a delicate balance between enabling mobile business services and protecting data and end-use privacy. The challenge will span across IT disciplines from development to operations, but the opportunity will enable businesses to offer more services and likely boost employee productivity as well.

Here is a preview of the questions that will be addressed in the #TechViews Security TweetChat:

  1. What is the biggest security risk mobility poses?
  2. What is the most important mobile element to secure: device, application or backend?
  3. How is the management and security of APIs fundamental to any mobile app or cloud security project?
  4. Some say security is a hindrance to cloud, a recent study showed some say cloud security is a top benefit of cloud. Why would this be?
  5. How can businesses leverage mobility to enhance security?
  6. How can IT enable the business with new security capabilities (not just to prevent bad things from happening)?

To learn more about mobile and cloud security prior to the chat, please download the white paper “TechInsights Report: Cloud Succeeds. Now What?” and read the TechViews Blog: What’s the Biggest Security Risk Mobility Poses? And please download the calendar invite to the #TechViews Security TweetChat here.

Written by

Denise Dubie

CA Leadership

Denise is senior principal, content strategy at CA Technologies. As a former IT industry journalist…

Published in

View this topic
  • James Holland

    This is great. Hooray for Disney’s imagineers!

    become a new brand in the share market research with its accurate research. Proven
    itself always right whether market is bull or bear. Last week all paid clients
    booked handsome profit in NIFTY, BANKINIFTY & STOCKS. Now for the coming
    week we expect more correction can come in NIFTY as the IRAQ issue is getting
    more tense, If it happens more then you will see a sharp fall in all world marketNSE BSE, STOCK TIPSbecause as we know all world run on
    crude & most of the crude comes from IRAQ. So be ready for a sharp fall so
    sell will be the best strategy for next week also. Traders can make a sell
    position in NIFTY around 7600-7650 with stoploss 7750 for the target of
    7300-7200.One can also make a sell call NIFTY 50 stocks as per NIFTY levels. You
    can also take our two days free trial to check our accuracy. For further updates
    you can visit our website. http://goo.gl/sMgZ7n



  • king lear

    testing comment functionality, please do not publish this

  • Love the personal pic 🙂

    • CAHighlight

      Thank you!

  • Plutora Inc

    This is a good case study. 2.3 sec’s off a login transaction is big.

  • While the analysts were hyping DevOps, I posted the oversight of not including security as part of that discussion as you are highlighting here. Instead of just talking DevOps, it should be DOS (what’s old is new again 🙂 – DevOpsSec. As a previous AppDev person, it’s the app, who’s using it, why and where rather than the device and having the service available.

    As you rightly point, out Security should be baked into the solution.

    Nice Post and Timely!


    • CAHighlight

      Thank you for your feedback Michele. Agreed – security cannot be overlooked. Appreciate your input!

  • Mitesh

    I would love a printed copy

  • Lars Johansson

    I love the idea of BYOID! This makes me choose if I am almost anonymous (with my Hotmail Nicname) or official with identity from an official organisation. My Identity Provider will attach identity with right level of LoA according to the need of the Service provider.

    • CAHighlight

      Thank you for your comment. BYOID has tangible benefits for end users and relying parties but it also has to be weighed in the balance with potential risks and liability concerns. It will be interesting to see how BYOID plays out in the enterprise.