Whether your organization is embracing a BYOD or a CYOD program, ulitmately what are most important are the steps you take to secure company data. Here are some steps on how to do just that.
Protecting company data has always been a difficult challenge, and with every passing day it becomes harder to do. As Mary-Pat Cormier says in her guest post today, "companies have become aware that the risk of being hacked is unavoidable." Fortunately, she has some very good advice to share on what to do to financially and legally protect your company before and after a breach.
Nearly 36 percent of IT security professionals admit to sending sensitive data outside of their organizations without using any form of encryption to protect it, a new survey from Voltage Security found. The survey showed that almost half of respondents are not de-identifying any data within their organizations.
As data migrates across networks, borders and devices, focusing solely on the physical location of data is no longer relevant, argues market research firm Gartner.
Chief information security officers are dropping the ball when it comes to big data by not implementing a data-centric, comprehensive data security policy, says Brian Lowans, principal research analyst at Gartner.
A new BYOD survey finds that 100 percent of employees use open public Wi-Fi networks. That means some training is definitely called for to help employees better understand the risks that BYOD brings.
Gen. Keith Alexander, who retired in March after eight years as the director of the NSA, said the NSA "faithfully did" its job but failed at one thing. Can you guess what that one thing was?
As enterprises move more of their data to the cloud, they are increasingly concerned about regulatory compliance issues regarding that data, according to a survey 1,068 tech professionals by cloud portfolio management firm RightScale.
The Heartbleed bug, which is present in two-thirds of websites, is adding to the security risks of small businesses, the BBC reports.
Mobile operators' deployment of high-speed 4G LTE networks has opened the door to security threats because of vulnerabilities inherent in the all IP architecture, warns Stephane Teral, principal analyst for mobile infrastructure and carrier economics at Infonetics Research