Bring Your Own Device (BYOD)
Bookmark and Share
  • Cyber threats organisations will deal with in 2014

    08.11.2013

    The threat landscape is constantly evolving, and it’s an enterprise’s job and duty to keep up with the changes and do the best it can to protect its data, employees and networks.

  • Secure corporate BYOD solution by ForeScout

    30.10.2013

    ForeScout Technologies announced interoperability between ForeScout CounterACT network security and SAP Afaria mobile device management (MDM) platforms.

  • Characteristics of effective security leaders

    28.10.2013

    A new IBM study of security leaders reveals that they are increasingly being called upon to address board-level security concerns and as a result are becoming a more strategic voice within their organizations.

  • Traditional security models becoming exhausted

    28.10.2013

    The Nexus of Forces is transforming the approach towards information security as new requirements are brought about by social, mobile, cloud and information.

  • Cyber attacks targeting the energy sector on the rise

    24.10.2013

    Alert Logic examined the rise of cyber attacks targeting the energy sector—an industry thought to be particularly at risk due to the highly confidential and proprietary information they possess, as well as the prevalence of BYOD and contractor access.




Spotlight

The role of the cloud in the modern security architecture

Posted on 31 July 2014.  |  Stephen Pao, General Manager, Security Business at Barracuda Networks, offers advice to CISOs concerned about moving the secure storage of their documents into the cloud and discusses how the cloud shaping the modern security architecture.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Aug 1st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //