Bring-Your-Own-Device

Plan BYOD with the workers

Plan BYOD with the workers

Most BYOD discussions focus on technical issues, such as how to identify offending devices, how to keep them off the network, or how to limit the types of devices. But nobody is talking about the human element.

Authenticating new tech: Safeguarding mobile identities

Authenticating new tech: Safeguarding mobile identities

In the age of mobile, social and cloud, the so-called perimeter that businesses have been protecting for years is now dead.

Making peace with the cloud and BYOD

Making peace with the cloud and BYOD

If there are two trends that have created a multitude of issues for security professionals, they're cloud services and bring-your-own-device. But there are ways to manage them.

Embracing BYOD: Mobile challenge

Embracing BYOD: Mobile challenge By

Businesses may no longer be able to turn away employees who want to bring their smartphones and tablets to work, and connect to the corporate network. But is that actually a good thing?

Needed: Better app control

Needed: Better app control

Many of today's applications are designed to work over any port, which increases chances they won't be blocked by firewalls.

Danger within: Insider threat

Many organizations are focusing their security efforts on deterring the external attack -- often at the expense of catching the insider threat. This could be a costly oversight, especially with the rise of BYOD.

On-the-go defense

On-the-go defense

This featured article is a sample of our "Mobile Spotlight" issue and discusses mobile apps in the enterprise and how employees downloading them is cause for concern for IT departments.

Don't fear BYOD, embrace it and monitor it

Don't fear BYOD, embrace it and monitor it

As security professionals try and grapple with one of the biggest challenges in the industry, the key to embracing a bring-your-own-device (BYOD) environment is clear visibility.

Video: Protecting enterprise mobility through app management

By

With a slew of threat vectors to cover, security professionals are faced with one of the biggest challenges in the industry to date: mobility in the workplace. In this video, the founder and president of Appthority discusses app management in the enterprise.

Sponsored Video: Yorgen Edholm, CEO, Accellion Inc.

By

Dan Kaplan, executive editor of SC Magazine, sits with Yogen Edholm, CEO of Accellion Inc., to discuss mobility in the workplace in this insightful In Focus video.

Video: The expanded threat landscape

By

Bring-your-own-device and cloud security are just some of the topics that add to the changing threat landscape of online security.

IBM X-Force reports that mobile threats are increasing

By

While progress against security threats has been made, attackers are targeting new vulnerabilities, such as those found in mobile devices, according to the annual IBM X-Force study.

Dell bulks up on security with SonicWall buy

By

Dell has announced it will buy SonicWALL, a California-based provider of unified threat management security software.

Video: Mobile and social networking threats

By

From issues that corporations face with mobile security, to social networking threats on sites like Pinterest, there were endless hot topics at this year's RSA Conference 2012 in San Francisco.

Sponsored Video: Stephen Cobb of ESET on RSA 2012 hot topics

By

Stephen Cobb, security evangelist at ESET, discusses the hot topics at this year's RSA Conference 2012, including BYOD, attacks on social networks, and resource challenges in today's economy.

Sponsored Video: Tom Reilly of HP on big data

By

Tom Reilly, VP and general manager of HP Enterprise Security Products, discusses the issues facing the security industry today including targeted attacks, managing big data, and how bring-your-own-device also raises issues with mobile computing.

Defining a DLP strategy

Defining a DLP strategy

DLP solutions remain fairly immature, but the need to protect and monitor sensitive information is greater than ever.

Protect data on the go

Protect data on the go

The exploding use of smart mobile devices and the business productivity that accompanies this trend has many CIOs and IT administrators reeling.

Sign up for our newsletters

POLL