Showing 8 results for: BYOD ×

Meet the Self-Sealing Network

As businesses prepare themselves for the inevitability of business transformation through mobility, BYOD still stands as the big elephant in the room. While 75 percent of organizations allow employee-owned devices on the network, just 9 percent of them are fully aware of how, when and whose devices are accessing their networks throughout the workday. And when organizations can't even answer those basic questions, it becomes nearly impossible to enforce policies and control how user-owned devices interact with sensitive data.

Protect Your Neck: You Can't Depend on a Mobile Device to Protect You or Your Mobile App

If I could ingrain one piece of security wisdom into the minds of mobile application development teams, it would be, “Don’t depend on the security of the device for which you’re developing.” An attacker can leverage too many variables to construct an attack and compromise a mobile device. And as much as they might like to, any one development team can’t control all of those variables.

Survey Says... BYOD Here to Stay

According to the Ovum 2013 multi-market BYOX (bring-your-own-anything) employee study, BYOD is here to stay. The global industry analyst firm encourages CIOs to respond with a clear strategy, warning business leaders to “respond and adapt now to this change in employee behaviour, rather than being steamrollered by it.”

Infographic: The High Cost of BYOD

Businesses today are embracing BYOD, and mobile applications are becoming the preferred platform for users and customers to access data and even conduct transactions.

Forbes: Is Your Mobile App Safe?

Trustwave Director of Application Security Services Charles Henderson offers his take on mobile app security in this Forbes article. He's one of the folks at Trustwave SpiderLabs who tests mobile application security on behalf of clients.