BYOD

Panel: Expect productivity gains with BYOD

By

A panel of CISOs speaking this week in London said businesses will benefit from an environment in which employees are entrusted with their own mobile devices.

Policies, employee awareness can help solve BYOD dilemmas

Policies, employee awareness can help solve BYOD dilemmas

There's no denying that CSOs will have to deal with bring-your-own-device sooner or later, but ultimately it will lead to an enhanced workforce.

No more trusted endpoints

No more trusted endpoints

The theater of risk has changed from network service-based attacks to attacks against the endpoint.

Building a trustworthy mobility program

Building a trustworthy mobility program

As device adoption continues to grow, the importance of implementing a secure enterprise mobility program cannot be understated.

The high-tech hydra: BYOD

The high-tech hydra: BYOD

By

No a business' size, employees are yearning to connect their personal devices to the corporate network. But fear not: Solutions and best practices are starting to emerge to manage the risk attached with this craze.

SC Congress NY: To cut BYOD security costs, get specific

By

Security experts at SC Congress New York said that well-defined user guidelines set the stage for more efficient, less costly BYOD

The challenges of securing enterprises in a BYOD world

The challenges of securing enterprises in a BYOD world

Companies are permitting BYOD even if they have policies against it. But a set of best practices, covering areas such as IT inventory and device detection, can mitigate many of the corresponding risks.

Plan BYOD with the workers

Plan BYOD with the workers

Most BYOD discussions focus on technical issues, such as how to identify offending devices, how to keep them off the network, or how to limit the types of devices. But nobody is talking about the human element.

Authenticating new tech: Safeguarding mobile identities

Authenticating new tech: Safeguarding mobile identities

In the age of mobile, social and cloud, the so-called perimeter that businesses have been protecting for years is now dead.

MDM and BYOD: A square peg for a round hole

MDM and BYOD: A square peg for a round hole

While mobile device management will always be in use in the enterprise, thankfully, a better option exists.

A better way to segregate data by classification level

A better way to segregate data by classification level

One of the many challenges that industry professionals face today is categorizing data within their own network. But there are ways to minimize the headaches and still ensure security.

Making peace with the cloud and BYOD

Making peace with the cloud and BYOD

If there are two trends that have created a multitude of issues for security professionals, they're cloud services and bring-your-own-device. But there are ways to manage them.

Embracing BYOD: Mobile challenge

Embracing BYOD: Mobile challenge

By

Businesses may no longer be able to turn away employees who want to bring their smartphones and tablets to work, and connect to the corporate network. But is that actually a good thing?

Needed: Better app control

Needed: Better app control

Many of today's applications are designed to work over any port, which increases chances they won't be blocked by firewalls.

Danger within: Insider threat

Many organizations are focusing their security efforts on deterring the external attack -- often at the expense of catching the insider threat. This could be a costly oversight, especially with the rise of BYOD.

Don't fear BYOD, embrace it and monitor it

Don't fear BYOD, embrace it and monitor it

As security professionals try and grapple with one of the biggest challenges in the industry, the key to embracing a bring-your-own-device (BYOD) environment is clear visibility.

Five BYOD threats you must solve today - or risk losing your job

Five BYOD threats you must solve today - or risk losing your job

Bring-your-own-device is a hot topic and a growing trend that security professionals are going to have to face - like it or not.

Video: Protecting enterprise mobility through app management

By

With a slew of threat vectors to cover, security professionals are faced with one of the biggest challenges in the industry to date: mobility in the workplace. In this video, the founder and president of Appthority discusses app management in the enterprise.

What does "bring-your-own-device" mean for enterprise security?

What does "bring-your-own-device" mean for enterprise security?

One of the hottest topics in the security industry revolves around employee-owned devices in the workplace, aka bring-your-own-device.

The IT staff of the future will speak business, not just technology

The IT staff of the future will speak business, not just technology

With emerging technologies that must be controlled, the demand to align business risk with security is growing. As such, the IT role is being reinvented under our feet, and those who function more like a CIO will rule the world.

Sponsored Video: Julian Lovelock, VP of product marketing, ActivIdentity

By

ActivIdentity's Julian Lovelock discusses challenges in the IT security world today with Dan Kaplan, executive editor of SC Magazine, in this insightful In Focus video.

How mobile security breeds concern for companies

How mobile security breeds concern for companies

By

Mobile security problems continue to vex many an IT security officer.

SC Congress Canada: Policies can combat mobile worries

By

Experts at this year's SC Congress Canada in Toronto discussed the challenges of BYOD and how implementing policies may be the industry's biggest weapon.

Bridging corporate and personal

Bridging corporate and personal

There is increasing pressure to make corporate resources available to users on any device.

Exotic, new connections: Embedded devices

Exotic, new connections: Embedded devices

By

For a while, only traditional PCs were connected to the public internet. But with most devices now gaining networked capabilities, it's only a matter of time before your television can contract a virus.

Protect the network and boost productivity

Protect the network and boost productivity

Application control is now an absolute necessity in a comprehensive security policy because threats have evolved.

Video: The expanded threat landscape

By

Bring-your-own-device and cloud security are just some of the topics that add to the changing threat landscape of online security.

Malicious software meets BYOD

Malicious software meets BYOD

Bringing together two separate pieces of security research reveals vulnerability to cybercrime on an alarming scale.

The state of BYOD

The state of BYOD

Enterprises are being exposed to multiple operating systems, models and operators - requiring IT teams to support the safe deployment of personal devices used for work purposes.

Video: Mobile and social networking threats

By

From issues that corporations face with mobile security, to social networking threats on sites like Pinterest, there were endless hot topics at this year's RSA Conference 2012 in San Francisco.

Sign up to our newsletters

POLL