Access "Cloud security key to BYOD, (ISC)2 study shows"
This article is part of the February 2013 issue of Technology in the dock
Businesses welcome bring your own device (BYOD) policies for the operational cost savings and user experience, according to the (ISC)2 2013 Global Information Security Workforce Study. At the same time, the study – conducted on behalf of the (ISC)2 Foundation by the analyst firm Frost & Sullivan – shows that information security managers admit companies must do more to understand the security of the technologies behind the trend, particularly cloud-based systems and applications. BYOD is a prevalent practice, according to selected results released at a press conference previewing the Infosecurity Europe 2013 conference at Earls Court in London from 23 to 25 April. Some 53% of more than 12,000 respondents from 145 countries said their companies actively allow employees, business partners or both to connect their devices to their networks. A similar proportion, 54% identified BYOD as a growth area for training and education in the information security profession. Increased BYOD concern But security professionals are concerned organisations remain unprepared ... Access >>>
Premium Content for Free.
Europe-wide patents could spread smartphone wars
by Jennifer Scott
We look at how upcoming legislation for a single European patent will affect the ongoing battles between smartphone and tablet manufacturers
- Europe-wide patents could spread smartphone wars by Jennifer Scott
Cloud security key to BYOD, (ISC)2 study shows
by Warwick Ashford
(ISC)2 says businesses welcome bring your own device (BYOD) policies for cost savings and user experience, but need the right security skills
King.com gaming site unlocks big data with Hadoop
by Brian McKenna
Online gaming company King.com replaced its MySQL database with Cloudera’s Hadoop distribution to cope with big data
- Cloud security key to BYOD, (ISC)2 study shows by Warwick Ashford
More Premium Content Accessible For Free
Social Media: IT Purchasers get social, marketers play catch up ?
IT decision makers are using social media effectively at work, but marketers are playing catch up, according to this research snapshot.
Can national security and privacy co-exist?
In this week’s Computer Weekly, we talk to NSA whistleblower Bill Binney about the often-conflicting needs of security and privacy. We find out how ...
Cultivating IT Talent
While the latest GCE A-Level results suggest that more people than ever will go on to study science, technology, engineering and maths (Stem) courses...