BYOD - News, Features, and Slideshows

BYOD in pictures

  • In pictures: 12 big BYOD predictions for 2014

    In pictures: 12 big BYOD predictions for 2014

    If you were just getting comfortable with BYOD, brace yourself for new twists and turns. CIOs can expect more devices to enter the enterprise in consumer clothing, real security threats to emerge, new MDM options and much more in 2014.

  • In pictures: 12 BYOD disaster scenarios

    In pictures: 12 BYOD disaster scenarios

    Everyone seems to be jumping on the bring-your-own-device (BYOD) bandwagon, but it's a bumpy ride. There are many ways to fall off and get a bloody nose (or worse). As the BYOD reality catches up to the hype, here are 12 very real disaster scenarios.

  • In Pictures: 10 BYOD worker types

    In Pictures: 10 BYOD worker types

    The Bring Your Own Device (BYOD) movement affects everyone at a company, from CEO on down to the hourly worker. Here are 10 of the most common worker types taking shape in the new BYOD workplace.

News about BYOD
Features about BYOD
  • BYOD is as entrenched (and complicated) as ever

    The bring-your-own-device (BYOD) trend has been around for years now, and even though it's become a fixture at many companies, some IT shops are still grappling with how to make it work.

  • 12 hot US security start-ups to watch

    Going into 2014, a whirlwind of security start-ups are looking to have an impact on the enterprise world. Most of these new ventures are focused on securing data in the cloud and on mobile devices. Santa Clara, California-based Illumio, for example, founded earlier this year, is only hinting about what it will be doing in cloud security. But already it's the darling of Silicon Valley investors, pulling in over $42 million from backer Andreesen Horowitz, General Catalyst, Formation 8 and others.

  • Tips for testing your mobile app security

    The enterprise has gone mobile and there's no turning back. And while the BYOD movement has received plenty of attention, IT departments are getting a handle on the security risks of personal mobile devices in the workplace. The next challenge is "bring your own application" (BYOA), because many public app stores have serious malware problems.

Whitepapers about BYOD

[]