Premium Content

Access "Cloud security key to BYOD, (ISC)2 study shows"

Published: 06 Feb 2013
Technology in the dock

This article is part of the February 2013 issue of Technology in the dock

Businesses welcome bring your own device (BYOD) policies for the operational cost savings and user experience, according to the (ISC)2 2013 Global Information Security Workforce Study. At the same time, the study – conducted on behalf of the (ISC)2 Foundation by the analyst firm Frost & Sullivan – shows that information security managers admit companies must do more to understand the security of the technologies behind the trend, particularly cloud-based systems and applications. BYOD is a prevalent practice, according to selected results released at a press conference previewing the Infosecurity Europe 2013 conference at Earls Court in London from 23 to 25 April. Some 53% of more than 12,000 respondents from 145 countries said their companies actively allow employees, business partners or both to connect their devices to their networks. A similar proportion, 54% identified BYOD as a growth area for training and education in the information security profession. Increased BYOD concern But security professionals are concerned organisations remain unprepared ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features

More Premium Content Accessible For Free

  • Open Group technical document: IT Specialist Certification Accreditation Policy
    Open Group technical document - IT Specialist Certific Accreditation Policy.jpg
    E-Handbook

    Clearly “book learning” is a critical first step to becoming effective at anything. But the effectiveness, potential, and the degree and value of ...

  • Time to get serious about endpoint security
    CWE_220714_ezine_23p-1MED.jpg
    E-Zine

    In this week’s Computer Weekly, with billions of devices joining corporate networks every year, our latest buyer’s guide looks at endpoint security. ...

  • CW500 IN THE CITY - Jason Scott-Taggart
    CWITC-1.jpg
    E-Handbook

    Jason Scott-Taggart, head of IT service management at Worldpay looks at how Barclays met the challenge of implementing technologies to support ...