- AusCERT 2013: Deploying BYOD in a government environment
- BYOD in bloom, according to Cisco survey
- BYOD and ITSM: What you need to know
BYOD in pictures
BYOD programs may come with the restriction of apps that consume too much data, risk malware or distract workers. Here are 10 iPhone apps that you're likely to find on a blacklist.
Strong executive desire to use iPhones led the Department of Sustainability, Environment, Water, Population and Communities to start looking for solutions that would separate government from personal information.
A Cisco survey of mobile users reveals strong desire for BYOD programs and clear productivity gains. But hold off on those BYOD mandates because the love for corporate devices hasn't burned out yet.
Mobile vendors are pushing technologies that split a smartphone into two separate platforms for business and personal data. Problem solved, right? Not so fast. It's still easy for employees to circumvent the two worlds.
VMware has partnered with Verizon to offer dual persona smartphones for Verizon enterprise customers. It's currently available on two Android-based phones, but more Android devices and iOS support are expected soon.
What is a good BYOD policy? Step one is to clarify the rights of both company and employee and state upfront what's business and what's personal. But there's a lot more to it. In this interview with a technology transactions lawyer, CIO.com explores the do's and don'ts of BYOD policies.
It's a good bet you don't know how much your company is spending on all those bring-your-own-device smartphones and tablets. Even worse, it's probably too much, says a mobility management expert.
As more companies adopt a bring-your-own-device (BYOD) approach to mobile, many are getting caught by hidden costs. But virtualization titan VMware has bucked that trend. VMware CIO Mark Egan explains how his company accomplished its feat.
For years, information security experts have predicted a spike in mobile malware. Will 2013 be the year of mobile attacks? And what other security threats are on the horizon?
To make more efficient use of data and improve data protection, take a holistic approach to information governance-one that focuses attention on the most sensitive data while removing impediments to sharing.
Whitepapers about BYOD
Change is the only constant. New technologies and a new generation of mobile, connected workers are creating an entirely new way of working, with implications that can be felt from the corner office to the home office. Organisations that adapt—and adapt now—stand ready to reap the rewards. Learn more.
Sign up now »
- FTFlash / ActionScript Developer - ContractNSW
- FTLead Software EngineerSA
- FTSenior Python DeveloperNSW
- FTOS Web Applications DeveloperNSW
- FTTechnical Business AnalystNSW
- FTQuality ManagerSA
- FTR&D EngineerSA
- FT.NET - Sitecore Developer - Melbourne - PermNSW
- FTJob Title: Mac Systems/ Enterprise Systems EngineerNZ
This story is becoming frustratingly old. Cyber threats are continuously advancing in their adaptability speed, sophistication, and degree of stealthiness. At the same time, the exposed footprint is expanding. More ...
The nature of work has changed fundamentally and forever and it continues to evolve rapidly. Geographic distance and ...
"Suggesting that people's "purpose is to get information to flow through the ..."
Why change management doesn’t work
"Darn those pesky laws that get in the way of commercial exploitation ..."
Larry Page wants to see your medical records
"Instead of partitioning the device between corporate and personal data, another approach ..."
Dual-Persona Smartphones Not a BYOD Panacea
"Well that's a nice back-handed compliment isn't it? So now, finally, my ..."
After two-year hiatus, EFF accepts bitcoin donations again
"Actually, both Mobile App developers and CIOs should be blamed for it. ..."
CIOs struggle to deliver timely mobile business apps: survey
- Layered defenses largely fail to block exploits, says NSS
- Researchers warn of increased Zeus malware activity this year
- AusCERT 2013: Four dissenters to spur next year's security debates
- AusCERT 2013: Kill the password, says Mozilla
- AusCERT 2013: Unmanaged, unknown privileged logins opening the door for APTs: Cyber-Ark
- Analytics and personalisation drive leading marketer behaviour: Report
- Innovation and big data take centre stage during CMO panel
- Twitter targets second screen interaction with Amplify advertising partnerships
- Facebook talks hyper-targeting, analytics and cross-platform at AANA event
- Tapping into social experience: Tourism Australia