Below you will find reports with the tag of “BYOD” Cybersecurity Topics: How Employees Impact Cyber Defense This survey looked at company security on the employee level, finding that many employees are not careful with their data. Added: December 1, 2020 Guardians Of The Cloud - 2019 Cloud Security Report This paper uses a unique and MARVEL-ous approach to provide insight into maintaining a robust cybersecurity posture in today’s fast-paced world. (more available) Added: September 18, 2019 Replace AV Buyers Guide Carbon Black adapts key sections from the SANS Buyer’s Guide for Endpoint Security and provides assistance for helping you assess your options. (more available) Added: January 1, 2019 Healthcare's Most Wired: National Trends 2018 Historically, the annual Most Wired research has focused on measuring adoption of healthcare information technology to highlight those organizations with the broadest, deepest IT infrastructure. (more available) Added: November 21, 2018 Mobile App Security via Code Injection This article is fourth in a five-part series developed by Dr. Edward Amoroso in conjunction with the mobile security team from Blue Cedar. (more available) Added: October 24, 2018 MediaPro Best Practice Series: Battling The Forgetting Curve This paper seeks to provide guidance in understanding the best ways to train employees so that the don’t forget important information. (more available) Added: October 23, 2018 The CIO's Guide To Mobile Threat Defense This is a handy guide for CIO’s that seeks to provide guidance for Mobile Threat Defense. Added: October 23, 2018 New Detection Survey Unveils Top 5 Cybersecurity Threats Facing Companies Over The Next 2 Years In August 2017, Cyber adAPT partnered with research and smart data firm Aberdeen Group to conduct a threat detection survey. The results provide critical data and the ability to analyze a variety of detection technology questions and scenarios. (more available) Added: October 21, 2018 An Integrated Approach To IT Troubleshooting In this paper, we will share some approaches to monitoring your IT environment and how those approaches impact troubleshooting. Added: October 17, 2018 Mobile Maturity Matrix: Where Does Your Business Fall? This report draws key insights from a survey conducted by IDG Connect on behalf of Wandera and VMware to assess the varying levels of mobile maturity within organizations, analyzing key indicators such as risk management, content filtering and data usage management. (more available) Added: October 16, 2018 Are Wireless Medical Devices "Hospital Grade?" This paper will take a quick look at two real-world examples of product releases gone wrong and overview the risks & challenges inherent in optimizing performance of wireless medical devices. (more available) Added: October 14, 2018 Beginner's Guide To Encryption Device Authority’s Beginners’ Guide to Encryption is designed to help you understand the basics of how encryption works, why it matters, and what challenges are facing encryption in the new landscape of the Internet of Things (IoT). (more available) Added: October 14, 2018 Choosing A Mobile App Integration Solution This paper seeks to aid the reader with choosing a mobile app integration solution. Added: October 13, 2018
Cybersecurity Topics: How Employees Impact Cyber Defense This survey looked at company security on the employee level, finding that many employees are not careful with their data. Added: December 1, 2020
Guardians Of The Cloud - 2019 Cloud Security Report This paper uses a unique and MARVEL-ous approach to provide insight into maintaining a robust cybersecurity posture in today’s fast-paced world. (more available) Added: September 18, 2019
Replace AV Buyers Guide Carbon Black adapts key sections from the SANS Buyer’s Guide for Endpoint Security and provides assistance for helping you assess your options. (more available) Added: January 1, 2019
Healthcare's Most Wired: National Trends 2018 Historically, the annual Most Wired research has focused on measuring adoption of healthcare information technology to highlight those organizations with the broadest, deepest IT infrastructure. (more available) Added: November 21, 2018
Mobile App Security via Code Injection This article is fourth in a five-part series developed by Dr. Edward Amoroso in conjunction with the mobile security team from Blue Cedar. (more available) Added: October 24, 2018
MediaPro Best Practice Series: Battling The Forgetting Curve This paper seeks to provide guidance in understanding the best ways to train employees so that the don’t forget important information. (more available) Added: October 23, 2018
The CIO's Guide To Mobile Threat Defense This is a handy guide for CIO’s that seeks to provide guidance for Mobile Threat Defense. Added: October 23, 2018
New Detection Survey Unveils Top 5 Cybersecurity Threats Facing Companies Over The Next 2 Years In August 2017, Cyber adAPT partnered with research and smart data firm Aberdeen Group to conduct a threat detection survey. The results provide critical data and the ability to analyze a variety of detection technology questions and scenarios. (more available) Added: October 21, 2018
An Integrated Approach To IT Troubleshooting In this paper, we will share some approaches to monitoring your IT environment and how those approaches impact troubleshooting. Added: October 17, 2018
Mobile Maturity Matrix: Where Does Your Business Fall? This report draws key insights from a survey conducted by IDG Connect on behalf of Wandera and VMware to assess the varying levels of mobile maturity within organizations, analyzing key indicators such as risk management, content filtering and data usage management. (more available) Added: October 16, 2018
Are Wireless Medical Devices "Hospital Grade?" This paper will take a quick look at two real-world examples of product releases gone wrong and overview the risks & challenges inherent in optimizing performance of wireless medical devices. (more available) Added: October 14, 2018
Beginner's Guide To Encryption Device Authority’s Beginners’ Guide to Encryption is designed to help you understand the basics of how encryption works, why it matters, and what challenges are facing encryption in the new landscape of the Internet of Things (IoT). (more available) Added: October 14, 2018
Choosing A Mobile App Integration Solution This paper seeks to aid the reader with choosing a mobile app integration solution. Added: October 13, 2018