Sunday Mar 26

Posts Tagged ‘BYOX’

Mar
13/12
Join me for the online P2P chat on BYOD this Thursday (RSA Conference Online)
Last Updated on Tuesday, 13 March 2012 11:27
Written by jj
Tuesday, March 13th, 2012
Share

This Thursday, March 15th, I’ll be hosting the RSA Conference Online Peer2Peer chat session on BYOD, “Doubts, Dread and Decisions: Dealing with BYOD in the Enterprise”. The live P2P session at RSA was full 15 minutes before we started! If you missed that session, or couldn’t attend RSA, this is your opportunity to participate with your peers. Registration is free and open to the public.

(more…)

Tags: , ,   |  Posted under Events  |  Comments  No Comments
Mar
07/12
Consumerization is not BYOD, and what that means for security
Last Updated on Wednesday, 7 March 2012 04:15
Written by jj
Wednesday, March 7th, 2012
Share

…and BYOD doesn’t necessarily mean consumerazation. Here are some key differences that affect how we’ll manage and secure devices following these two trends. (more…)

Tags: , ,   |  Posted under Network Niblets  |  Comments  1 Comment
Feb
15/12
BYOD Articles, Opinions and Surveys
Last Updated on Wednesday, 7 March 2012 04:00
Written by jj
Wednesday, February 15th, 2012
Share

I’ll be updating this page with BYOD resources I’ve found helpful, including media coverage, real war stories and results of surveys and statistics. We all love numbers, don’t we?

(more…)

Tags: ,   |  Posted under NAC & 802.1X  |  Comments  1 Comment
Feb
12/12
Your BYOX Resource Guide
Last Updated on Wednesday, 15 February 2012 02:55
Written by jj
Sunday, February 12th, 2012
Share

BYOX is my new buzzronym. Here are your resources for BYOX at the RSA Conference and beyond.

(more…)

Tags: , , , ,   |  Posted under Featured  |  Comments  No Comments
Feb
12/12
Guide to BYOD at RSA 2012
Last Updated on Wednesday, 15 February 2012 03:40
Written by jj
Sunday, February 12th, 2012
Share

Are you looking for the best BYOD content at the 2012 RSA Conference? If so, here’s a list of events and sessions to add to your agenda.

(more…)

Tags: , , , , , , , , ,   |  Posted under Events  |  Comments  1 Comment

More Content

Find more of my content at
- Low Tech Hacking book
- Dark Reading
- Network Computing
- IANS
- SearchSecurity
- TechTarget

Get Social

RSSFacebookLinkedinYoutube

Subscribe

Enter your email address:

Delivered by FeedBurner

NetworkedBlogs