Bring Your Own Device (BYOD)
Bookmark and Share
  • Major gaps found in the governance of emerging technologies

    05.03.2014

    SailPoint published an infographic which outlines recent research results that indicate that while global enterprises are embracing - and in some instances mandating - the use of cloud and mobile technologies, they do not have IT controls in place to properly manage them.

  • 96 percent of apps have security vulnerabilities

    20.02.2014

    Improvements in patch deployment and secure coding practices have made a slight impact on the incidence of vulnerabilities, according to a new Cenzic report.

  • Free guide: 5 Best practices for BYOD

    12.02.2014

    This how-to guide from IT Harvest covers 5 Best Practices for BYOD and includes a checklist for developing flexible, yet secure BYOD policy.

  • Mobility is the weakest security link

    07.02.2014

    Surveying more than 750 security decision makers and practitioners, a CyberEdge Group report found that more than 60 percent had been breached in 2013 with a quarter of all participants citing a lack of employer investment in adequate defenses.

  • Most non-IT employees don't "get" company IT security policies

    22.01.2014

    DataMotion released results of its second annual survey on corporate email and file transfer habits.




Spotlight

Free security software identifies cloud vulnerabilities

Posted on 21 October 2104.  |  Designed for IT and security professionals, the service gives a view of the data exchanged with partner and cloud applications beyond the network firewall. Completely passive, it runs on non-production systems, and does not require firewall changes.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Tue, Oct 21st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //