Security is as much about the use policies as it is about technology deployed – in fact some might argue that defining policies for network…
Developing an Enterprise IT security policy
Posted on 18 October 2011 by Gemalto in Enterprise Security
Security is as much about the use policies as it is about technology deployed – in fact some might argue that defining policies for network…
The next in our series of blog posts looking at the security issues affecting CIOs in the modern era focuses on the rise of personal…
Our recent CIO research has suggested that remote access is a security sore-point for many businesses. We picked up on this trend and charted the…
In the final installment of our series of examining CIOs’ attitudes towards security, we turn our attention to France. Perhaps the most striking aspect of…
Back in 2012, our research into CIOs’ attitudes towards security threw up some interesting insights into IT leaders’ attitudes towards BYOD (Bring Your Own Device).…
Latest comments