Despite all the warnings in the tech media about Bring-Your-Own-Device, or BYOD, security risks, a minority of organizations have implemented policies or processes to address BYOD, a new study finds.
While mobile device penetration in Europe is high, European firms remain reluctant to allow BYOD. Surprising, employees are the ones holding back BYOD.
Security worries continue to hold enterprises back from embracing mobility, according to a survey of 3,500 IT decision makers in 15 countries by Wakefield Research and commissioned by HP.
Close to half of organizations either do not have a mobile device policy at all or have not fully implemented the policy they have in place, according to a survey of 1,100 IT security pros who are members of the LinkedIn Information Security Community.
For insights on what consumerization in IT means to you, we invite you to join the FierceCIO webinar on "Consumerization and the CIO" to be held July 29, at 2 p.m. EST.
A growing awareness of cyber threats has many organizations adding the role of chief security officer or chief information security officer. Bob West shares his thoughts on when you need one, and what you should hold them accountable for.
The top news stories for July 18, 2014.
The newly released ForeScout State of IT Cyber Defense Report, based on independent research conducted by IDG Connect surveying 1600 IT information security decision-makers, reveals the nature and extent of the security threats and defense maturity in the finance, manufacturing, healthcare, education and retail sectors in the U.S., U.K., Austria, Germany and Switzerland.
The top news stories for July 16, 2014.
Security weaknesses discovered in some Web-based password managers could potentially allow an attacker to steal passwords with no outward sign that anything is amiss.