BYOD news, analysis, research, how-to, opinion, and video.

google htc nexus 9 tablet tablets
byod security


Microsoft's Surface Pro 4, the tablet that can finally replace your laptop

With the Surface Pro 4, Microsoft builds on the previous generations of the Surface line, getting them closer than ever to their goal of creating a tablet that will replace your laptop.

byod laptop mobile

Is It time to re-evaluate your BYOD policy?

How can you tell if your employees have gone rogue with their personally owned devices and put corporate data at risk?

iphone enterprise

Apple in the enterprise: Tim Cook capitalizes on what Steve Jobs ignored

Apple CEO Tim Cook is boasting impressive growth in the enterprise, a market that his legendary predecessor ignored.

wearables workers

Are wearables worth the cybersecurity risk in the enterprise?

The rise of the Internet of Things (IoT) and smart wearable devices pose new risks to enterprise cybersecurity.

mobile hotpsots best practices

Shape of mobility to come isn’t clear

The way businesses architect their operations to take best advantage of mobile technology, and the way they manage those mobile devices, are likely to evolve in the near future – but the precise nature of that evolution is far from...

byod keyboard bring your own device mobile

BYOD is as entrenched (and complicated) as ever

The bring-your-own-device (BYOD) trend has been around for years now, and even though it's become a fixture at many companies, some IT shops are still grappling with how to make it work.

decontamination shower radiation protection suit chemical toxic substance nuclear power station 000

'Culture of denial': Nuclear industry's cybersecurity shortcomings revealed in new report

International policy institute Chatham House says that the use of default passwords and a lack of air-gapping are among the causes of nuclear infrastructure vulnerability.

smartphones tablet mobile devices

More data breaches caused by lost devices than malware or hacking, Trend Micro says

Trend Micro's new cybersecurity report says most breaches are actually caused by device loss, rather than malware or hacking.

Mobile device management illustration

Mobile device management has become alphabet soup

The BYOD movement, once looked on as the holy grail of employee satisfaction and IT mobile device security, is increasingly being supplanted by a number of options – such as COBO, CYOD, COPE – that draw a thicker line between personal...

mobile apps and touch screen

Is a lack of enterprise apps killing BYOD?

Bring-your-own-device policies in the workplace often pit employee satisfaction and privacy against corporate security. And as the number of employees and companies participating in BYOD programs continues to fall, can enterprise apps...

man texting

5 ways to shore up security in your BYOD strategy

Despite years in the making, many security leaders are still wary about BYOD policy. Here are five ways to combine security and privacy with the ever-increasing demand for user-owned devices in the enterprise.


BYOD – the tech revolution that wasn’t

Once upon a time, BYOD and the consumerization of IT was held up as a paragon of productivity and cost savings for enterprises that embraced the concept. Now? Not so much… What happened?

law technology court robot

Technology, the law, and you: BYOD

Companies are getting a lot more cautious about BYOD – and legal implications might be part of the reason why.

byod keyboard bring your own device mobile

The BYOD debate is not over

It's been looking like BYOD was more myth than reality, in the words of one observer. But given the imminent demise of phone subsidies and other factors, BYOD may well undergo a rebirth.

the case for a successful byod strategy image.jpg

The bring-your-own-device fad is fading

U.S. companies are moving away from the bring-your-own-device (BYOD) trend that kicked off in earnest five years ago and had workers using their personal smartphones and tablets for work duties, according to a new study.

BYOD users worry employers can’t keep private data safe

Workplace smartphone and tablet users worry a lot about their personal information remaining private from their employers – and only a slim majority trusts their employer to keep that data safe, according to a Harris Poll survey...

threat detection intelligence alert

How to use threat intel to boost mobile security

Integrating threat intelligence feeds with mobile device management platforms can shore up BYOD security.

djay apple watch

Pretty much all of the Apple Watches are coming to work

Almost all current or perspective users of smartwatches and other wearable technologies want to use them for work, according to a Harris Poll survey commissioned by MDM vendor MobileIron.

Load More