byod

To BYOD or Not BYOD? Let Your Risk Decide
Before the iPhone came to town, BlackBerry was all the rage. No one had smartphones, but all the cool people had a BlackBerry. Technology evolved, and it was soon out with the ...
Security Boulevard

How to Do the Impossible and Secure BYOD
The use of cloud tools in the enterprise is becoming increasingly common, enabling employees to collaborate and work incredibly efficiently. On top of this, when employees are allowed to work from their ...
To Err is Human: Cybersecurity Training Your Employees
The Vaporstream Team | | byod, c-suite, Cyber Security, cyber training, Phishing, Privacy, secure messaging, security, Uncategorized
As we come to the end of cyber security month – we must admit to ourselves that to err is human. You can employ the latest technology at your company to bolster ...

Office 365 and the Long Tail of SaaS Apps at Gartner Symposium
Bitglass just attended the Gartner Symposium & ITxpo in Orlando, Florida, where we had a fantastic time. With more and more companies moving to the cloud, people were eager to learn about ...

MSFT Azure AD Conditional Access vs CASB
For many organizations, the move to the cloud means many more ways for employees to access sensitive data. The days of the corporate-issued laptop on the network (or VPN) being the only ...

Data Breaches on the Rise in Financial Services
Financial services organizations are a prime target for hackers looking to steal and sell valuable data. This is because these firms handle sensitive information known as PII, personally identifiable information, as well ...

Cloud Access Security Brokers and Cyber Security Chicago
Recently, Bitglass participated in the Cyber Security Conference in Chicago. At our booth, we were listening to customer stories about how they are strengthening their cybersecurity and adapting to changing technological trends; ...

How to Protect Data in a BYOD World
Mike Schuricht | | byod, BYOD Security, CASB, Cloud Apps and BYOD, Compliance, Enterprise Mobility Management, Mobile Security
Every day, more and more corporate information is moving to employees' personal devices. This rise of BYOD (bring your own device) provides increased flexibility and productivity to employees and, consequently, the organizations ...

Translating Cybersecurity Jargon to English
Tony Bradley | | Artificial Intelligence, byod, Cybersecurity, encryption, IoT Security, security, tech jargon
You don’t need to be technologically savvy to be able to understand cybersecurity. All you need is someone with deeper insights to explain it using friendly, everyday vocabulary. I established my writing ...

Old Technology: We All Use It, But At What Risk?
How old technology may be introducing security risks to the corporate network We may think of today’s corporate America as a mobile workforce, with everybody conducting business from their phones or tablets ...
Security Boulevard