Latest Headlines

Latest Headlines

Taking BYOD from the cubicle to the conference room

BYOD programs are in place at most organizations today, and a growing number of companies are using BYOD to improve the quality of staff meetings.

News Scan: DATA Act passes Senate; 2013 a record year for mega breaches;

The top news stories for April 14, 2014.

Special Report: Making BYOD work

Chief information officers and enterprise IT departments face a myriad of challenges when allowing employees to bring their own mobile devices into the work environment. Issues related to management, support, security and access control abound.

News Scan: Mobile drives email use; Google beefs up Android security;

Check out the hottest mobile IT stories for April 11, including the rise of the corporate email due to enterprise mobility, Google's attempt to safeguard independent apps, the ineffectiveness of mobile games when staying relevant, wireless making its way into European buildings and the explosion in indoor location installations.

Data threats and your staff: too many suspects

If you think you can trust your employees to have the company's data safety and security at heart, think again. Inside jobs account for an alarming percentage of data compromises at most organizations.

Is the cybersecurity skills shortage a national crisis?

Should the U.S. make the training and development of cyber security professionals a national priority? One security expert says absolutely!

The year of the insider threat

While organizations try to remain on guard against a host of outside IT security threats, this year may in fact be the year of the insider threat, one security expert argues.

BYOD market becoming lucrative opportunity for device makers

Hang onto your BYOD devices. The BYOD device market is expected to soar to $238.4 billion in just six years, a three-fold increase from last year's figure, according to the latest forecast from Grand View Research.

Government moves could force data breach confessions

Organizations in virtually all industries could soon be impacted by govenment moves that would require public data breach alerts and limit the storage of personal information.

IT security pros: worst pressures come from inside

The number one obstacle to IT security solutions are business pressures within the same organizations, which is causing tremendous dissatisfaction among IT security pros.