Access "Cloud security key to BYOD, (ISC)2 study shows"
This article is part of the February 2013 issue of Technology in the dock
Businesses welcome bring your own device (BYOD) policies for the operational cost savings and user experience, according to the (ISC)2 2013 Global Information Security Workforce Study. At the same time, the study – conducted on behalf of the (ISC)2 Foundation by the analyst firm Frost & Sullivan – shows that information security managers admit companies must do more to understand the security of the technologies behind the trend, particularly cloud-based systems and applications. BYOD is a prevalent practice, according to selected results released at a press conference previewing the Infosecurity Europe 2013 conference at Earls Court in London from 23 to 25 April. Some 53% of more than 12,000 respondents from 145 countries said their companies actively allow employees, business partners or both to connect their devices to their networks. A similar proportion, 54% identified BYOD as a growth area for training and education in the information security profession. Increased BYOD concern But security professionals are concerned organisations remain unprepared ... Access >>>
Premium Content for Free.
Europe-wide patents could spread smartphone wars
by Jennifer Scott
We look at how upcoming legislation for a single European patent will affect the ongoing battles between smartphone and tablet manufacturers
- Europe-wide patents could spread smartphone wars by Jennifer Scott
Cloud security key to BYOD, (ISC)2 study shows
by Warwick Ashford
(ISC)2 says businesses welcome bring your own device (BYOD) policies for cost savings and user experience, but need the right security skills
King.com gaming site unlocks big data with Hadoop
by Brian McKenna
Online gaming company King.com replaced its MySQL database with Cloudera’s Hadoop distribution to cope with big data
- Cloud security key to BYOD, (ISC)2 study shows by Warwick Ashford
More Premium Content Accessible For Free
Computer Weekly networking case studies
Jennifer Scott and Steve Evans discover what made the winning entries stand out from the crowd in the 2014 Computer Weekly European Awards for ...
Special Report on VDI
The articles contained here were written by Brian Madden, the fiercely independent thought leader in the world of virtualisation and mobility ...
Spies in the VPN
In this week’s Computer Weekly, the NSA/GCHQ snooping scandal has added to concerns about security of virtual private networks (VPNs) – we find out ...