This policy guidebook was created to help guide you through the questions to ask and provide some best practices to consider when establishing your own BYOD policies.
SailPoint published an infographic which outlines recent research results that indicate that while global enterprises are embracing - and in some instances mandating - the use of cloud and mobile technologies, they do not have IT controls in place to properly manage them.
Improvements in patch deployment and secure coding practices have made a slight impact on the incidence of vulnerabilities, according to a new Cenzic report.
This how-to guide from IT Harvest covers 5 Best Practices for BYOD and includes a checklist for developing flexible, yet secure BYOD policy.
Surveying more than 750 security decision makers and practitioners, a CyberEdge Group report found that more than 60 percent had been breached in 2013 with a quarter of all participants citing a lack of employer investment in adequate defenses.