Mike Rothman of Securosis Complete comments:
The problems in protecting endpoints are pretty well understood. As we described in The 2014 Guide to Endpoint Security, you have stuff (private data and/or intellectual property) that others want. On the other hand, you have employees that need to do their jobs and require access to said private data and/or intellectual property. So these employees have the data on their devices and that creates the need to protect those endpoints. It’s not like this is anything new. Protecting endpoints better has been a focus of security professionals since, well, always – with decidedly unimpressive results.
Good ideas here in the first part of a series from Mike Rothman. Old thinking about new technology will cause security problems. Read on to learn how to un-think your way to a solution.