Are IT groups really ready for BYOD security challenges?
A new survey of IT security professionals shows that many businesses are barely starting to exploit mobile technology, and some of them may be a mobile security nightmare waiting to happen.
A new survey of IT security professionals shows that many businesses are barely starting to exploit mobile technology, and some of them may be a mobile security nightmare waiting to happen.
CIOs in the U.S. struggling with the Bring Your Own Device (BYOD) trend might want to look across the pond to see what their European counterparts are doing -- or rather, not doing.
At a well-known investment firm in New York City, something strange is happening: Mobile app performance issues and privacy concerns have sparked a Bring Your Own Device (BYOD) revolt, and now many employees are asking for their corporate BlackBerry back.
Just about every Silicon Valley tech company wants to fill its ranks with smart millennials -- the future of the workforce. Wooing them hasn't been easy. Competition for their services is fierce. Giants such as Google, Facebook and Twitter are throwing wads of cash at them.
The sleuths over at The Verge reported last week that Microsoft is looking for beta testers for the pre-release versions of Office for Android. Despite a slow holiday week, the news traveled pretty fast. If you have an Android tablet, you can sign up at the SharePoint website for recruiting testers.
Can a college campus filled with exuberant students and free-thinking professors armed to the hilt with smartphones and tablets find a way to establish business-like network security and appropriate-use expectations without crimping everyone's style?
A growing number of businesses will face challenges associated with legacy IT systems, according to Micro Focus.
The Bring Your Own Device movement was supposed to make employees more productive while saving companies money. But a funny thing is happening on the way to mobile nirvana: Companies aren't doing it, according to a new study by CompTIA.
Like many aspects of security, Arbor Networks has seen the issues surrounding BYOD evolve for many years.
In today's bring-your-own-device and cloud services enterprise, real-world stories of data loss abound. What's really horrifying: Things seem to be getting worse.
Webroot today released the results of a survey on BYOD that suggests the employee-employer trust gap is widening. The company also created an eight-point "BYOD Bill of Rights" to help bridge that gap while keeping corporate data secure.
Just because BYOD has become standard operating procedure in most workplaces doesn't mean the practice has stopped causing challenges for IT.
Many workers who bring their mobile devices to the office don't care about security, which is forcing IT leaders to take action. Some CIOs offer stipends to help cover mobile expenses in return for BYOD compliance. Others are choosing to throw the kill switch on lost or stolen smartphones.
Nathan McBride joined AMAG Pharmaceuticals in 2008 with an ambitious goal: to rebuild IT using as little internal infrastructure as possible. He succeeded.
When we asked about tech favorites, several IT pros cited tools they've acquired to help address mobile device management, data security and application control.