Bring Your Own Device (BYOD)
Bookmark and Share
  • Empowered Millennials expect BYOD

    11.07.2014

    New data finds that Millennials—the new generation of workers born between the early 1980s and the early 2000s—are highly dedicated to their jobs and often times work well beyond normal business hours.

  • Exploring the BYOD security dynamic

    11.07.2014

    Webroot examined the use and security of personal mobile devices in the work environment from both the employee and employer perspectives.

  • Exploring the mobile security landscape

    07.07.2014

    In this interview, Adam Ely, COO of Bluebox, discusses the most significant mobile security challenges for enterprise security professionals, illustrates how BYOD is shaping the enterprise mobile security landscape, and offers advice for CISOs trying to protect data confidentiality and integrity while working with an increasingly mobile workforce.

  • eBook: The CIO playguide for secure BYOD

    26.06.2014

    Mobile devices and the ability to work everywhere present a huge opportunity but also pose a challenge for IT in securing corporate data.

  • Company and employee disconnect on BYOD security policies

    22.05.2014

    Many employees do not take adequate steps to protect company information, a weakness that could result in critical security breakdowns, according to Webroot.




Spotlight

USBdriveby: Compromising computers with a $20 microcontroller

Posted on 19 December 2014.  |  Security researcher Samy Kamkar has devised a fast and easy way to compromise an unlocked computer and open a backdoor on it: a simple and cheap ($20) pre-programmed Teensy microcontroller.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Fri, Dec 19th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //