BYOD brings out the classic problem between control of corporate information and individual freedom. It kicks it up to a whole new level because the devices belong to the users, but at least some of the apps and information belong to the company and as such need protection and policy enforcement.
- UK’s NCSC catches Turla’s new in-memory ‘Neuron’ malware for attacking Windows
- Automated security testing helps developers clamp down on IoT, open-source threats
- Google’s G Suite gets new dashboard to spot new threats
- Is your PC vulnerable to Meltdown and Spectre CPU exploits? InSpectre tells you
- Despite their app appetite, Australian businesses still struggling to extend compliance to the cloud