Where’s Your Security Vulnerability: on a Mobile Device or in the Cloud? #TechViews

Where’s Your Security Vulnerability: on a Mobile Device or in the Cloud? #TechViews

#TechViews Mobile Security TweetChat 1 PM ET – Tuesday, October 29, 2013  techviews

Disruptive trends such as mobility and cloud computing challenge IT security professionals today. They need to secure the data, devices and environments to protect corporate and customers assets while also leaving enough room to enable innovative business services.

CA Technologies next week will host a Twitter Chat delving further into the topic of IT security, specifically addressing how mobility and cloud computing are forcing IT organizations to change their approach to protecting assets, data and privacy. The discussion stems in part from a recent study from CA, “TechInsights Report: Cloud Succeeds, Now What?”, which showed while security was the biggest inhibitor for placing specific applications in the cloud, it was also considered one of the bigger benefits of adopting cloud computing by some.

Stack of mobile telephones

Separately, the issue of secure mobility is also causing much discussion among industry watchers who are recognizing that even with new technologies, IT organizations need to establish a delicate balance between enabling mobile business services and protecting data and end-use privacy. The challenge will span across IT disciplines from development to operations, but the opportunity will enable businesses to offer more services and likely boost employee productivity as well.

Here is a preview of the questions that will be addressed in the #TechViews Security TweetChat:

  1. What is the biggest security risk mobility poses?
  2. What is the most important mobile element to secure: device, application or backend?
  3. How is the management and security of APIs fundamental to any mobile app or cloud security project?
  4. Some say security is a hindrance to cloud, a recent study showed some say cloud security is a top benefit of cloud. Why would this be?
  5. How can businesses leverage mobility to enhance security?
  6. How can IT enable the business with new security capabilities (not just to prevent bad things from happening)?

To learn more about mobile and cloud security prior to the chat, please download the white paper “TechInsights Report: Cloud Succeeds. Now What?” and read the TechViews Blog: What’s the Biggest Security Risk Mobility Poses? And please download the calendar invite to the #TechViews Security TweetChat here.

The following two tabs change content below.

Denise Dubie

Principal of Strategic Content at CA Technologies
Denise Dubie (@DDubie) is Principal of Strategic Content in CA Technologies Thought Leadership Group. Denise is charged with creating content relevant to today’s most pressing technology and business trends for industry leaders and IT professionals. Prior to joining the company in 2010, Dubie spent 12 years of her career at Network World, an IDG company, covering the IT management industry and all of its players (including CA Technologies and its competitors) as well as high-tech careers, technology trends and vendors such as Cisco, HP, IBM and Microsoft. As Senior Editor at Network World, Dubie also authored the publication's twice-weekly Network and Systems Management Alert newsletter and contributed to the Web site's Microsoft Subnet blog. Before IDG, she served as Assistant Managing Editor at Application Development Trends, managing writers and the monthly publication's production process. Dubie started her professional journalism career as a Staff Writer/Reporter at The Transcript, a small daily paper in Western Massachusetts. You can find Denise on Google+ at Denise Dubie and Twitter @DDubie.

Leave a Reply