Bring Your Own Device (BYOD)
Bookmark and Share
  • Whitepaper: Best practices for making BYOD simple and secure

    24.04.2014

    BYOD programs and policies empower people to choose the best device to get their work done, including personally-owned consumer smartphones, tablets and laptops.

  • Major gaps found in the governance of emerging technologies

    05.03.2014

    SailPoint published an infographic which outlines recent research results that indicate that while global enterprises are embracing - and in some instances mandating - the use of cloud and mobile technologies, they do not have IT controls in place to properly manage them.

  • 96 percent of apps have security vulnerabilities

    20.02.2014

    Improvements in patch deployment and secure coding practices have made a slight impact on the incidence of vulnerabilities, according to a new Cenzic report.

  • Free guide: 5 Best practices for BYOD

    12.02.2014

    This how-to guide from IT Harvest covers 5 Best Practices for BYOD and includes a checklist for developing flexible, yet secure BYOD policy.

  • Mobility is the weakest security link

    07.02.2014

    Surveying more than 750 security decision makers and practitioners, a CyberEdge Group report found that more than 60 percent had been breached in 2013 with a quarter of all participants citing a lack of employer investment in adequate defenses.




Spotlight

The psychology of phishing

Posted on 23 July 2014.  |  Cybercriminals no longer send out thousands of emails at random hoping to get a handful of hits, today they create highly targeted phishing emails which are tailored to suit their recipients.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Thu, Jul 24th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //