IT is embracing BYOD
IT is accepting, and in some cases embracing, “bring your own device” (BYOD) as a reality in the enterprise. A new Cisco study shows some of the quantifiable …
Top three security concerns for CSOs and CIOs
The breakneck speed of technology evolution, the ever changing threat landscape, and the increasing flexibility, ingenuity and persistence of cyber attackers have made …
Do mobile devices in the workplace create security problems?
The role of IT managers has changed drastically in a short period of time – revolutionized by smart mobile devices and increased remote connection tools. While end users …
Avaya secures mobile collaboration and BYOD
Avaya Identity Engines 8.0 enables organizations to provide employees and guests with secure, controlled access to wired and wireless networks from their personal devices. …
Securing mobile apps in the enterprise
The mobile app has become the endpoint. With the advent of consumerization and BYOD, the number of managed devices began shrinking and that of unmanaged devices continues to …
ForeScout and Fiberlink fortify mobile security
ForeScout and Fiberlink announced a partnership to deliver an integrated MDM and NAC offering. The new product, ForeScout MDM powered by MaaS360, combines cloud-based mobile …
Identity as a Service platform for cloud service providers
Symplified announced Symplified Structure which enables telcos, cloud service providers, cloud application brokers, and cloud application hosting companies to seamlessly …
A basic shift in network defense
“In our industry, most of the companies we were working with have spent the the better part of the past ten years securing the perimeter of the network with intrusion …
Mobile security and identity management in the cloud
Executive-level security officers at some of the largest global companies have identified four main concerns for 2012: mobile device security, identity management for cloud …
Secure USB desktop environment for the enterprise
Imation announced the general availability of its ultra-secure StealthZONE PC-on-a-stick desktop environment to enterprise customers. Already used by national governments and …
Security monitoring for BYOD environments
Lancope showcased its solution for securing bring-your-own-device (BYOD) environments based on the company’s flow-based monitoring technology. Unlike other BYOD security …
BYOD is both an opportunity and a threat
A survey titled “What is your approach to BYOD – Love it? Hate it?” and conducted among 316 IT and security professionals set out to assess the opinions of …
Featured news
Resources
Don't miss
- Data-stealing VS Code extensions removed from official Marketplace
- Flawed WordPress theme may allow admin account takeover on 22,000+ sites (CVE-2025-4322)
- What good threat intelligence looks like in practice
- AutoPatchBench: Meta’s new way to test AI bug fixing tools
- Third-party cyber risks and what you can do