The adoption of BYOD policies in SMBs means that IT has to protect devices that they didnít even specify, procure or configure.
At Black Hat USA 2014, ForeScout Technologies, provider of pervasive network security solutions for Global 2000 enterprises and government organizations, and ThreatStream, a cyber intelligence company that enables the disruption of cyberattacks in real time, announced a partnership and plans to enable the ThreatStream OPTIC platform to interoperate with ForeScoutís CounterACT platform.
In this interview, Zuk Avraham, CEO of Zimperium, talks about iOS security myths and threats, discusses the difficulties in exploring iOS security vs.
If an IT department creates a BYOD policy and no one at the company knows about it, does it actually make an impact? Iíll spare you the suspense - the answer is no.
A new study found that nearly half of respondents agreed that users bringing downloaded apps or content with embedded security exploits into their organization, as well as malware infections, are top BYOD security concerns.