Premium Content

Access "Cloud security key to BYOD, (ISC)2 study shows"

Published: 06 Feb 2013
Technology in the dock

This article is part of the February 2013 issue of Technology in the dock

Businesses welcome bring your own device (BYOD) policies for the operational cost savings and user experience, according to the (ISC)2 2013 Global Information Security Workforce Study. At the same time, the study – conducted on behalf of the (ISC)2 Foundation by the analyst firm Frost & Sullivan – shows that information security managers admit companies must do more to understand the security of the technologies behind the trend, particularly cloud-based systems and applications. BYOD is a prevalent practice, according to selected results released at a press conference previewing the Infosecurity Europe 2013 conference at Earls Court in London from 23 to 25 April. Some 53% of more than 12,000 respondents from 145 countries said their companies actively allow employees, business partners or both to connect their devices to their networks. A similar proportion, 54% identified BYOD as a growth area for training and education in the information security profession. Increased BYOD concern But security professionals are concerned organisations remain unprepared ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features

More Premium Content Accessible For Free

  • The next frontier for managed print services
    The-next-frontier-for-managed-print-services-(1361197877_756).jpg
    E-Handbook

    The managed print services (MPS) market has matured since many organisations inked their first deal. Organisations moving beyond first generation ...

  • World-Class EA: The Agile Enterprise
    World-Class-EA---The-Agile-Enterprise-(1360587978_371).jpg
    E-Handbook

    The concept of “agile” has recently come to the fore, typically in connection with technical activities, such as software development. Subsequently, ...

  • Security Visualisation
    Security-visualisation-(1358519141_684).jpg
    E-Handbook

    This article is guideline of how to generate a visual representation of a given dataset and use in the evaluation of known security vulnerabilities. ...