Premium Content

Access "Cloud security key to BYOD, (ISC)2 study shows"

Published: 06 Feb 2013
Technology in the dock

This article is part of the February 2013 issue of Technology in the dock

Businesses welcome bring your own device (BYOD) policies for the operational cost savings and user experience, according to the (ISC)2 2013 Global Information Security Workforce Study. At the same time, the study – conducted on behalf of the (ISC)2 Foundation by the analyst firm Frost & Sullivan – shows that information security managers admit companies must do more to understand the security of the technologies behind the trend, particularly cloud-based systems and applications. BYOD is a prevalent practice, according to selected results released at a press conference previewing the Infosecurity Europe 2013 conference at Earls Court in London from 23 to 25 April. Some 53% of more than 12,000 respondents from 145 countries said their companies actively allow employees, business partners or both to connect their devices to their networks. A similar proportion, 54% identified BYOD as a growth area for training and education in the information security profession. Increased BYOD concern But security professionals are concerned organisations remain unprepared ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features

More Premium Content Accessible For Free

  • The lost opportunity – assessing the impact of OTT services
    Impact of OTT services.jpg
    E-Handbook

    In this special report for Computer Weekly readers, Juniper Research looks at the challenges and opportunities facing mobile operator business models.

  • Cloud enabling the banking industry
    Cloud enabling the banking industry.jpg
    E-Handbook

    This report explores how the banking industry architecture network (Bian) service landscape may be used to define a comprehensive commercial ...

  • CW Buyer's Guide to Enterprise Collaboration
    CWE_BG_0514_collaboration.jpg
    E-Handbook

    In this 10-page buyer's guide, Computer Weekly highlights what the IT leader needs to know to decide on the future of the organisation's ...