Australia's leading source of security and threat news
Bring Your Own Device
These search results are from across the Techday Network of sites
Is BYOD an expensive mistake for your business?
Security is one of the biggest issues with BYOD because of the security risk posed by consumer-grade phones.
Venafi announces new enterprise endpoint management solution
Organisations must provide mobile devices of all types with secure machine identities that support authentication, encryption and decryption.
57% of enterprises suspect their mobile workers have been hacked
iPass has released the results of a survey that sought to determine how companies are dealing with the trade-off between security and mobile workers.
Struggling with IoT or BYOD? Here’s how to overcome the main challenges
The ideas of ‘bring your own device’ (BYOD) and Internet of Things (IoT) are a dream come true for most employees – but a nightmare for IT staff.
Never worry about device security policies again with an NAC
IDC interviewed five organisations that use Aruba ClearPass as a policy management platform for network access control.
Asian SMEs lagging behind in data breach disclosure policies
Asia Pacific’s SMEs also worry about the cost of implementing cybersecurity technologies, believing that other business areas need funding more.
3 new small cell solutions launched by Ericsson to expand market
The new models have been designed to help expand the market & meet the growing demand for better mobile coverage and capacity in light of 5G and IoT.
IoT and BYOD still putting firms in the face of danger
As best practice security methods continue to evolve around the Internet of Things, so do the attacks on devices linked to corporate networks.
Symantec launches DLP solution that tracks data beyond company walls
Symantec has unveiled new technology that automatically encrypts and tracks data as it moves outside of managed environments.
VMware survey: ASEAN firms not doing enough about personal device security in workplace
81% of ASEAN businesses are allowing unapproved personal devices for work - and 38% of those devices don’t comply with their company’s IT policies.
The future is now: Epson unveils new innovations for the modern classroom
Epson recently announced some of the new must-have innovations for the modern classroom.
BYOD policies aren't all they shape up to be, says Netscout
Wi-Fi-enabled devices can also still degrade performance when not connected via Wi-Fi.
User behaviour may be the hidden secret to security, says Forcepoint
80% of cybersecurity professionals believe it’s important to understand people’s behaviours when it comes to intellectual property & critical data.
YOU’RE INVITED: cnPilot WiFi Technical Workshops hosted by Cambium Networks Distributors in NZ - Be in the know
Cambium Networks invites you to get involved and in the know about the latest WiFI news this month coming to a distributor's office near you.
BYOD causing headaches for enterprises when not managed correctly
“Doing nothing is not an option, because the problems caused by any failure to lead and manage BYOD pose too big a risk."
Wireless security: Protection beyond BYOD
A look into how Fortinet’s Secure Access Architecture (SAA) can help protect your client’s WLAN deployments from 100 billion IoT-based cyber attacks.
BYOD: With greater device choice comes greater responsibility, Australian survey finds
Choose Your Own Device (CYOD) & Bring Your Own Device (BYOD) workplaces are common but so are the problems that go with them, a new Jamf survey finds.
Transitioning BlackBerry inks NZ govt contract
"The customer wins in government and healthcare underline the continued adoption of BlackBerry enterprise software."
Your school's endpoint security: Solving the BYOD conundrum
BYOD is both an enabler and a risk. Ingram Micro can show you how Fortinet’s internal segmentation technology makes BYOD safer and more secure.
The impact of IoT, cloud and mobility on data center power and cooling infrastructure
Take a snapshot of your data center’s current power and cooling infrastructure. In five years, it is likely to be radically different.
Vendors to rely on partnerships for managed security as BYOD drives deception technology
“Vendors face significant challenges because of intense competition, technological advances, and frequent changes in end-user preferences."
BlackBerry Security Summit: IT decision makers concerned over mobile vulnerabilities
“BlackBerry recognises that security is a dynamic field, and even the best defensive strategies and technologies today may be inadequate tomorrow,”
2016 set to be a defining year for the cloud
"It’s clear that the use of cloud computing will continue to grow and will likely increase to become the bulk of new IT spend."
BYOD driving demand for SaaS-based IT security
"The market will grow at a rate of over 22% between now and 2020, with competition intensifying and tremendous growth opportunities for vendors."
Whitepaper: Why it’s critical to detect cyber attacks as they happen
"Many organisations are struggling to keep pace with the speed in which hackers are attacking their systems."
The features that should be front and centre when evaluating SIEMs
According to Frost & Sullivan, SIEM can either be an enabler or a retardant and there's a thin line between the two - here's the key attributes.
Cutting through the noise with AI-driven threat analytics
SANS has provided an independent review of a new AI analytics solution designed to rescue businesses 'drowning in data' from SIEM platforms.
What does sustainable compliance look like?
Getting an organisation compliant is one thing, keeping it that way is another.
The six golden keys to successful identity assurance
When someone tries to access your internal systems, how can you be sure a user is who they claim to be?