Access "Cloud security key to BYOD, (ISC)2 study shows"
This article is part of the February 2013 issue of Technology in the dock
Businesses welcome bring your own device (BYOD) policies for the operational cost savings and user experience, according to the (ISC)2 2013 Global Information Security Workforce Study. At the same time, the study – conducted on behalf of the (ISC)2 Foundation by the analyst firm Frost & Sullivan – shows that information security managers admit companies must do more to understand the security of the technologies behind the trend, particularly cloud-based systems and applications. BYOD is a prevalent practice, according to selected results released at a press conference previewing the Infosecurity Europe 2013 conference at Earls Court in London from 23 to 25 April. Some 53% of more than 12,000 respondents from 145 countries said their companies actively allow employees, business partners or both to connect their devices to their networks. A similar proportion, 54% identified BYOD as a growth area for training and education in the information security profession. Increased BYOD concern But security professionals are concerned organisations remain unprepared ... Access >>>
Premium Content for Free.
Europe-wide patents could spread smartphone wars
by Jennifer Scott
We look at how upcoming legislation for a single European patent will affect the ongoing battles between smartphone and tablet manufacturers
- Europe-wide patents could spread smartphone wars by Jennifer Scott
Cloud security key to BYOD, (ISC)2 study shows
by Warwick Ashford
(ISC)2 says businesses welcome bring your own device (BYOD) policies for cost savings and user experience, but need the right security skills
King.com gaming site unlocks big data with Hadoop
by Brian McKenna
Online gaming company King.com replaced its MySQL database with Cloudera’s Hadoop distribution to cope with big data
- Cloud security key to BYOD, (ISC)2 study shows by Warwick Ashford
More Premium Content Accessible For Free
The state of email trust in 2014
Email security improved in 2014 but most companies still haven't done enough to protect their customers from phishing attacks, this study from Agari ...
Strategies for the age of digital disruption
Disruption can happen at any time, in any sector, and its effect on traditional organisations can be fundamental. Capgemini offers some strategic ...
Bridging the big data divide: Part two
As the big data era takes hold, it is time to sit down with the business and sort out what IT can do to provide a fully supportive data platform for ...