Tag "BYOD"

Back to homepage
Mobile Software

Mobile Malware Incidents Hit 100% of Businesses

Attempted malware infections against BYOD and corporate mobile devices are expected to continue to grow, new data shows.Every business with BYOD and corporate mobile device users across the globe has

BYOD/Big Data

The evolution of BYOD security in a mobile-first world

Bitglass’ research team surveyed 200 IT and security professionals at a national Gartner conference to learn more about the evolution of BYOD security in a mobile-first world. Click Here To

BYOD/Big Data

Quarter of Firms Allow Password-Only BYOD Security

Over a quarter (28%) of organizations rely solely on user-generated passwords to secure BYOD, potentially exposing countless endpoints to credential guessing, cracking and theft, according to Bitglass. Click Here To View


Top blacklisted Android and iOS apps by enterprises

Enterprises blacklist apps for a range of security concerns, including specific malicious or data leakage behaviors, security policy compliance and concerns about shadow data storage. Appthority revealed the most frequently

BYOD/Big Data

BYOD Drives Prevalence of Insider Threat – Infosecurity Magazine

Over three-fifths of IT professionals believe that insider threats are more difficult to spot than attacks by malicious third parties, with the explosion in mobile endpoints a key challenge, according

Vendor News

Duo Security and VMware partner up on mobile solution – Cloud Pro

Duo Security and VMware have joined forces to offer Trusted Endpoints for mobile devices, which is designed to help businesses identify managed and unmanaged devices trying to gain access to

Industry Insights

The rise of remote risk: Three trends increasing your threat profile – TechWorld

Technology has fundamentally changed the face of our workplaces.Over the past decade, the introduction of collaborative tools like Google Docs, Slack and Dropbox enabled colleagues to work together on tasks

BYOD/Big Data

Using Virtualization To Enhance Security, Save On Infrastructure – CXOtoday.com

Gone are the days when employees joined the organizations with lifetime commitment. There are competing priorities including family considerations, children’s education, job of the spouse etc. in addition to age

Industry Insights

Security Technologies for an Optimal Security Posture

The perfect IT security solution is one that makes an enterprise completely secure and “unhackable,” where no unauthorized parties can get onto the network, access confidential data, deny service to


Android Security Apps for BYOD Users

With Android-toting employees increasingly infiltrating the workplace as part of the growing BYOD corporate culture, CISOs at large organizations as well as security managers at small organizations face an increasing