The need for security in virtual environments escapes many IT pros, yet a majority understand the importance of virtualization to their IT infrastructure.
Enterprises continue to struggle with BYOD policies, even though they are crucial for managing and securing personal devices in the workplace. Here are nine tips for effectively communicating your BYOD policy offered by Ryan Kalember, chief product officer for WatchDox.
While data lakes are being marketed as a key part of any big data solution, they could pose security and regulatory risks to the enterprise.
Worries over malware outbreaks and data breaches continue to keep CISOs up at night, which isn't surprising considering that most organizations report they can't find an acceptable security solution.
Despite all the warnings in the tech media about Bring-Your-Own-Device, or BYOD, security risks, a minority of organizations have implemented policies or processes to address BYOD, a new study finds.
While mobile device penetration in Europe is high, European firms remain reluctant to allow BYOD. Surprising, employees are the ones holding back BYOD.
Security worries continue to hold enterprises back from embracing mobility, according to a survey of 3,500 IT decision makers in 15 countries by Wakefield Research and commissioned by HP.
Close to half of organizations either do not have a mobile device policy at all or have not fully implemented the policy they have in place, according to a survey of 1,100 IT security pros who are members of the LinkedIn Information Security Community.
For insights on what consumerization in IT means to you, we invite you to join the FierceCIO webinar on "Consumerization and the CIO" to be held July 29, at 2 p.m. EST.
A growing awareness of cyber threats has many organizations adding the role of chief security officer or chief information security officer. Bob West shares his thoughts on when you need one, and what you should hold them accountable for.