Bring Your Own Device (BYOD)
Bookmark and Share
  • BYOD Policy Guidebook

    01.04.2014

    This policy guidebook was created to help guide you through the questions to ask and provide some best practices to consider when establishing your own BYOD policies.

  • Major gaps found in the governance of emerging technologies

    05.03.2014

    SailPoint published an infographic which outlines recent research results that indicate that while global enterprises are embracing - and in some instances mandating - the use of cloud and mobile technologies, they do not have IT controls in place to properly manage them.

  • 96 percent of apps have security vulnerabilities

    20.02.2014

    Improvements in patch deployment and secure coding practices have made a slight impact on the incidence of vulnerabilities, according to a new Cenzic report.

  • Free guide: 5 Best practices for BYOD

    12.02.2014

    This how-to guide from IT Harvest covers 5 Best Practices for BYOD and includes a checklist for developing flexible, yet secure BYOD policy.

  • Mobility is the weakest security link

    07.02.2014

    Surveying more than 750 security decision makers and practitioners, a CyberEdge Group report found that more than 60 percent had been breached in 2013 with a quarter of all participants citing a lack of employer investment in adequate defenses.




Spotlight

Dissecting the unpredictable DDoS landscape

Posted on 23 April 2014.  |  DDoS attacks are now more unpredictable and damaging than ever, crippling websites, shutting down operations, and costing millions of dollars in downtime, customer support and brand damage, according to Neustar.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Wed, Apr 23rd
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //