Access "Cloud security key to BYOD, (ISC)2 study shows"
This article is part of the February 2013 issue of Technology in the dock
Businesses welcome bring your own device (BYOD) policies for the operational cost savings and user experience, according to the (ISC)2 2013 Global Information Security Workforce Study. At the same time, the study – conducted on behalf of the (ISC)2 Foundation by the analyst firm Frost & Sullivan – shows that information security managers admit companies must do more to understand the security of the technologies behind the trend, particularly cloud-based systems and applications. BYOD is a prevalent practice, according to selected results released at a press conference previewing the Infosecurity Europe 2013 conference at Earls Court in London from 23 to 25 April. Some 53% of more than 12,000 respondents from 145 countries said their companies actively allow employees, business partners or both to connect their devices to their networks. A similar proportion, 54% identified BYOD as a growth area for training and education in the information security profession. Increased BYOD concern But security professionals are concerned organisations remain unprepared ... Access >>>
Premium Content for Free.
Europe-wide patents could spread smartphone wars
by Jennifer Scott
We look at how upcoming legislation for a single European patent will affect the ongoing battles between smartphone and tablet manufacturers
- Europe-wide patents could spread smartphone wars by Jennifer Scott
Cloud security key to BYOD, (ISC)2 study shows
by Warwick Ashford
(ISC)2 says businesses welcome bring your own device (BYOD) policies for cost savings and user experience, but need the right security skills
King.com gaming site unlocks big data with Hadoop
by Brian McKenna
Online gaming company King.com replaced its MySQL database with Cloudera’s Hadoop distribution to cope with big data
- Cloud security key to BYOD, (ISC)2 study shows by Warwick Ashford
More Premium Content Accessible For Free
A guide to storage and virtualisation
Virtualisation brings benefits to the datacentre, but it also brings big changes to storage provisioning and management. We look at the key ...
Agile Foundations – the Agile Manifesto
In this extract from their book, Agile Foundations, Peter Measey and Radtac explain the key principles of the Agile Manifesto.
Big Data BlackOut: Are Utilities Powering Up Their Data Analytics?
This report from Capgemini Consulting identifies a disparity between the utilities industry's perception of big data analytics and its implementation...