Please turn on your JavaScript for this page to function normally.
speed
The evolution of cloud and mobile security

In this podcast recorded at RSA Conference 2017, Salim Hafid, Product Marketing Manager at Bitglass, talks about how organizations are dealing with BYOD, cloud security, and …

IoT
Security programs not keeping up with IoT threats

More than 90 percent of IT security professionals said that connected devices will be a major security issue this year. However, 66% aren’t sure how many devices are in their …

smartphone
Consumers regularly share passcodes, creating compromising situations

Consumers keep more and more sensitive personal and professional information on their mobile phones, but most people remain alarmingly casual about adequately protecting that …

mobile
BYOD: How to provide secure access to network resources

IT organizations have little or no choice when it comes to Bring Your Own Device (BYOD) programs. Employees want to access the network with their personally owned devices, and …

BYOD
Employees rely largely on personally owned mobile devices in the workplace

Mobile device adoption in the workplace is not yet mature, found a recent survey from Gartner. Although 80 percent of workers surveyed received one or more corporate-issued …

BYOD
61% of employers have no BYOD policy

Trustlook has shared findings on the latest BYOD trends and best practices from a survey of 320 Android users. “Some findings validated existing beliefs, while others were …

team
Does your organization have an endpoint security strategy?

Only thirty-three percent of IT security professionals have security strategies in place to protect the growing number of endpoints on their networks, according to a recent …

Enterprise multi-factor authentication market to cross $1 billion this year

Evolving cyber threats contribute to hundreds of millions of dollars in losses for businesses each year due to compromised credentials and data breaches. ABI Research …

user
1 in 3 organizations have experienced an insider attack in the last year

A new Bitglass report on insider threats in the enterprise found that, in a third of organizations surveyed, careless or malicious user behavior resulted in data leakage, up …

BYOD
How much of a risk is BYOD to network security?

We’re all familiar with BYOD dangers: data breaches exploited because of a lack of proper security protocols and encryption on devices or missed operating system …

World map
Global cyber security market: Competition forecast and opportunities

Increasing cyber attacks on the critical infrastructure has rendered worldwide security at risk. The prime motive behind these attacks is to gain access to financial …

mobile device
How MDM software exposes your personal data

Bitglass tracked the personal mobile devices of several willing employee volunteers with mobile device management (MDM) software to understand how MDM could be misused and to …

Don't miss

Cybersecurity news