Bring Your Own Device (BYOD)
Bookmark and Share
  • Major gaps found in the governance of emerging technologies

    05.03.2014

    SailPoint published an infographic which outlines recent research results that indicate that while global enterprises are embracing - and in some instances mandating - the use of cloud and mobile technologies, they do not have IT controls in place to properly manage them.

  • 96 percent of apps have security vulnerabilities

    20.02.2014

    Improvements in patch deployment and secure coding practices have made a slight impact on the incidence of vulnerabilities, according to a new Cenzic report.

  • Free guide: 5 Best practices for BYOD

    12.02.2014

    This how-to guide from IT Harvest covers 5 Best Practices for BYOD and includes a checklist for developing flexible, yet secure BYOD policy.

  • Mobility is the weakest security link

    07.02.2014

    Surveying more than 750 security decision makers and practitioners, a CyberEdge Group report found that more than 60 percent had been breached in 2013 with a quarter of all participants citing a lack of employer investment in adequate defenses.

  • Most non-IT employees don't "get" company IT security policies

    22.01.2014

    DataMotion released results of its second annual survey on corporate email and file transfer habits.




Spotlight

The synergy of hackers and tools at the Black Hat Arsenal

Posted on 27 August 2014.  |  Tucked away from the glamour of the vendor booths and the large presentation rooms filled with rockstar sessions, was the Arsenal - a place where developers were able to present their security tools and grow their community.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Aug 29th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //