Home Search

BYOD - search results

If you're not happy with the results, please do another search

NCSC Releases Action Plan to Help Enterprises Deploy BYODs Securely

The increase in remote workforce encouraged several organizations across the globe to embrace the Bring Your Own Devices (BYODs) concept. However, using personal devices...
IoT attacks

How Surge in Remote Work Led to Rise of BYODs and Security Risks

The sudden surge in remote work due to the pandemic has encouraged organizations globally to embrace Bring Your Own Devices (BYODs) in the workplace....

Surge in Remote Work Drives BYOD; Security Remains Primary Concern

A latest survey from cloud security firm Bitglass revealed that the surge in remote work has encouraged businesses globally to embrace BYODs (Bring Your...
cybersecurity, password, password management

This Device Simplifies Password Management and Protects User Credentials

With a mission to provide cybersecurity to individuals to safeguard themselves from threat actors, a Pune-based (Maharashtra, India) cybersecurity enthusiast came up with a...
data management excellence

How to Ensure Data Management Excellence

In response to high-profile data breaches, staggering fines, and rapidly evolving privacy and data requirements, CIOs and CISOs are facing a critical mandate: to...
IoT devices

While Employees Work Remotely, Attackers Target Their IoT Devices Left in Office

While the pandemic forced employees to work from home, most of their IoT devices were left behind connected to the corporate networks. Unpatched flaws...
Chukwudum Chukwudebelu

“IoT technology will always improve but it will never be 100% secure”

The proliferation of the Internet of Things (IoT) in consumer, enterprise, and health care sectors, and their internal vulnerabilities, have created a security blind...
Cybersecurity, CEO, CISO

How Communication Service Providers are Keeping the World Connected During COVID-19

The extraordinary value of digital communications has never been more apparent than during the past year. As COVID-19 swept the planet, businesses and individuals...
COVID-19 Cyberthreats

Cybersecurity After COVID-19

In addition to the health and economic impacts of COVID-19, society had to grapple with a plethora of new and persistent cybersecurity threats. As...
Verizon Data Breach Investigation Report

4 Common Attack Vectors You Need to Know

Online adversaries always advance their hacking techniques to enhance their attack vectors. Cybercriminal groups focus on different kinds of cyberthreats such as data breaches,...