BYOD Security

BYOD still in ‘emergent’ phase, get with it, you guys
The BYOD trend is still in its emergent phase and not really as widespread as all the buzz would have you believe, according to Christian Reilly of Citrix.  
In today’s BYOD world, securing the DNS is crucial
Securing the DNS is not the first thing on security teams’ minds, but can be key to shutting out the latest malware, according to Infoblox CEO Jesper Andersen.
Soda has more than just a ‘token’ bid to secure mobile devices
Businesses continue to use unsecured devices to house and transmit sensitive corporate data,k which is was what drove infocomm security expert Dr Kwok-Yan Lam and banker and financier Michael Tse to found Soda, a Singapore-based startup that has developed a virtual tokenisation layer to secure mobile devices.
Cybersecurity is about people too: FortiGuard strategist
Conversations about IT security often revolve around technology and processes, and rarely about a third critical element: People. That’s a mistake, according to Jack Chan, a security strategist at Fortinet Inc’s FortiGuard Labs.
Cyber-attacks and the Monday morning blues
There has been a massive increase in malware detections on Monday mornings when users reconnect their devices to the corporate network, according to new research published recently in the annual NTT 2015 Global Threat Intelligence Report.
Small businesses dismissing mobile risks, overlooking BYOD threats
Many small-business owners believe the BYOD (bring-your-own-device) trend poses no threat to their company, and have no interest in spending effort on mobile device security, according to Kaspersky Lab.
BYOD reality check for you and your organisation
Before you jump head first into your BYOD programme, consider a few things to help you establish the right blend of personal preference and workplace functionality, writes Brian Robison of Citrix.
What the Hillary Clinton email issue tells us about mobile security
US presidential candidate Hillary Clinton’s use of her personal email account for official business has lessons for businesses in terms of securing their users and devices, writes James Chia of Aruba Networks.
Five key elements to complete IT compliance
In view of recent high-profile security breaches and compliance failures, organisations need to find a way to plug the gap between security and operations (SecOps). Gavin Selkirk of BMC Asia Pacific looks at how organisations can modernise their approach to compliance and close the SecOps gap with a strategy designed for today’s complex, dynamic IT environments.
BYOD security: It’s about company culture, not just devices
The key to securing the enterprise in this new world is to embrace a more holistic attitude to security that focuses on applications and identity, writes Chong Fook Hing of Oracle Corporation Malaysia.
Download Digerati50 2020-2021 PDF

Digerati50 2020-2021

Get and download a digital copy of Digerati50 2020-2021