Tag "BYOD"

Back to homepage
BYOD/Big Data

BYOD Drives Prevalence of Insider Threat – Infosecurity Magazine

Over three-fifths of IT professionals believe that insider threats are more difficult to spot than attacks by malicious third parties, with the explosion in mobile endpoints a key challenge, according

Vendor News

Duo Security and VMware partner up on mobile solution – Cloud Pro

Duo Security and VMware have joined forces to offer Trusted Endpoints for mobile devices, which is designed to help businesses identify managed and unmanaged devices trying to gain access to

Industry Insights

The rise of remote risk: Three trends increasing your threat profile – TechWorld

Technology has fundamentally changed the face of our workplaces.Over the past decade, the introduction of collaborative tools like Google Docs, Slack and Dropbox enabled colleagues to work together on tasks

BYOD/Big Data

Using Virtualization To Enhance Security, Save On Infrastructure – CXOtoday.com

Gone are the days when employees joined the organizations with lifetime commitment. There are competing priorities including family considerations, children’s education, job of the spouse etc. in addition to age

Industry Insights

Security Technologies for an Optimal Security Posture

The perfect IT security solution is one that makes an enterprise completely secure and “unhackable,” where no unauthorized parties can get onto the network, access confidential data, deny service to


Android Security Apps for BYOD Users

With Android-toting employees increasingly infiltrating the workplace as part of the growing BYOD corporate culture, CISOs at large organizations as well as security managers at small organizations face an increasing

BYOD/Big Data

Fostering a safe place for businesses to work in – Help Net Security

It’s no secret that in the past few years, business leaders have begun to realise the potential of digital transformation to give their organisation a competitive edge. Through driving productivity,

BYOD/Big Data

To secure BYOD, involve the business in managing its mobile privacy – CSO – The Resource for Data Security Executives

IT security organisations can boost adoption of bring your own device (BYOD) programs by delegating control over employee data privacy to business owners, a VMware security specialist has advised as

Industry Insights

Top 15 tips to improve cyber security – Telappliant

Even the largest and most sophisticated companies like Google and Facebook still succumb to the threat of cybercrime. So it’s not surprise that cybercrime is now the 2nd most reported


The top 5 mobile security threats – Computerworld

A smartphone can feel like a ticking time bomb to IT security pros. With the BYOD trend now well established in the workplace, and employees less vigilant about avoiding malicious