Quantcast
Channel: BringYourOwnIT.com » Mobile Security
Browsing all 17 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

BYOD: A Leap Of Faith For Enterprise Users? What has changed in the past year.

Post based on my remarks at Direction 2012 Conference* in Tokyo – August 7, 2012. I’ve been talking about Consumerization and BYOD – bring-your-own-device – for quite a while now. What has changed in...

View Article



Image may be NSFW.
Clik here to view.

Advice for BYOD users: don’t be naive about mobile security.

Trend Micro interviews at the Mobile Convention Amsterdam 2012 reveal a shocking lack of education with regard to the security risks posed by mobile devices. Here is what you should know. We all love...

View Article

Image may be NSFW.
Clik here to view.

Smartphone Security Winners & Losers

Post based on my interview with Jeanne Friedman, content manager for  RSA Conference. In the mobile space the BYOD trend is becoming a minefield for IT administrators. Many companies have experienced a...

View Article

Image may be NSFW.
Clik here to view.

Legal and technical BYOD pitfalls highlighted at RSA Conference

Companies that don’t protect themselves through policies place themselves at risk. Post based on my interview* with Mikael Ricknas of Computerworld. Allowing employees to bring their own devices to...

View Article

Image may be NSFW.
Clik here to view.

The Financial Impact of Consumerization – You can’t manage what you don’t...

The Consumerization of IT is a trend even the most parochial IT manager has surely heard of by now. It’s sweeping through enterprises across the planet with no regard for legacy, tradition or order and...

View Article


Image may be NSFW.
Clik here to view.

BYOD, Enterprise Mobility and Beyond – What to expect in 2013

Trend Micro’s CTO Raimund Genes recently published his traditional new year predictions for 2013. Quite insightful and mind opening paper, which I invite you to download and add to your reading list...

View Article

Image may be NSFW.
Clik here to view.

The Financial Impact of Consumerization – BYOD boosts productivity.

IT strategists and commentators alike have been talking about the cost impacts and benefits of the Consumerization of IT for years. However, no-one seems to agree on what’s actually going on out there...

View Article

Image may be NSFW.
Clik here to view.

The Financial Impact of Consumerization – The Hidden Costs

Executives and IT leaders are struggling to understand the true costs and benefits of IT consumerization and it’s not difficult to see why. Even a cursory Google search on the subject throws up as many...

View Article


Image may be NSFW.
Clik here to view.

Icebergs, The Nordics, and Other BYOD Considerations

New data shows that companies are increasingly exposed to security risks due to a variety of consumer-grade technology brought in by the employees. I just returned from a tour in the Nordic countries...

View Article


Image may be NSFW.
Clik here to view.

Mobile Security: iOS Jailbreaks Pose Risks

Jailbreaking is happening in the millions: don’t turn a blind eye. The latest jailbreak for iOS 6.1, released on 4 February, was downloaded by a whopping 5 million users in the first 48 hours alone,...

View Article

Image may be NSFW.
Clik here to view.

How secure is Mobile Device Management anyway?

Researchers have successfully breached the Good Technology container. MDM software can only be as secure as the underlying operating system. As the adoption of smartphones and tablets grows...

View Article

Image may be NSFW.
Clik here to view.

BYOD: You can’t manage what you don’t measure [VIDEO]

The Consumerization of IT is a trend even the most parochial IT manager has surely heard of by now. It’s sweeping through enterprises across the planet with no regard for legacy, tradition or order and...

View Article

Image may be NSFW.
Clik here to view.

BYOD – The Hidden Costs [VIDEO]

Executives and IT leaders are struggling to understand the true costs and benefits of IT consumerization and it’s not difficult to see why. Even a cursory Google search on the subject throws up as many...

View Article


Image may be NSFW.
Clik here to view.

BYOD – The Benefits [VIDEO]

IT strategists and commentators alike have been talking about the cost impacts and benefits of the Consumerization of IT for years. However, no-one seems to agree on what’s actually going on out there...

View Article

Image may be NSFW.
Clik here to view.

Cesare Garlati Joins prpl Foundation as Chief Security Strategist

SANTA CLARA, CA–(Marketwired – April 07, 2015) – Well-known information security expert Cesare Garlati today joins the prpl Foundation as Chief Security Strategist. Garlati will assist the Foundation...

View Article


Image may be NSFW.
Clik here to view.

Google Vault Makes Play for Mobile Security Hardware Space

Last week Google made a splash with its latest futuristic tech offering: Project Vault. In essence, this mini-computer on an SD card is designed to enable secure authentication, communications and data...

View Article

Image may be NSFW.
Clik here to view.

BYOD, Enterprise Mobility and Beyond – What to expect in 2013

Trend Micro’s CTO Raimund Genes recently published his traditional new year predictions for 2013. Quite insightful and mind opening paper, which I invite you to download and add to your reading list...

View Article

Browsing all 17 articles
Browse latest View live




Latest Images