Cyber Security, Cybercrime, BYOD - Relevant FreePint Resources
Jinfo Blog
25th August 2014
Abstract
We highlight FreePint's articles and reviews around cybercrime, cyber security, Bring Your Own Device (BYOD) and Bring Your Own Identity (BYOID).
Item
We recently had a query from a FreePint Subscriber about FreePint resources on cybercrime, cyber security, BYOD and BYOID.
We responded with a bespoke summary of our relevant articles, reviews and series.
If you have similar interests, you'll find this blog useful for navigating the full range of resources FreePint offers. Firstly we categorised the query into various aspects:
- Cybercrime; cyber security
- BYOID and BYOD
- Reviews.
We then highlighted the most relevant content under each heading:
Cybercrime; Cyber Security
- The Internet of Things - Protect Your Wearable Technology
- Keeping Track of Your Data - Identifying the Threats
- Privileged Users and Threats to Confidential Data
- We're All Hackers Now
- Cybercrime - Don't Waste a Crisis
- Security Breaches? It's the Innocent Ones You Need To Worry About
- Cyber Security in the Enterprise
- Hacking - Risk or Opportunity?
BYOID and BYOD
- BYOD Brings Challenges to IT Departments
- Personal and Professional Identities Merge: Bring Your Own ID
- Forget BYOD and COPE, It's Time for BYOID
- Whose Identity Is It Anyway?
- Large Software Vendors Bet on BYOD
Reviews
Editor's Note
Order your FreePint Subscription and gain access to the full archive of FreePint Articles and Reports, plus have the ability to share these resources with anyone else at your organisation.
- Blog post title: Cyber Security, Cybercrime, BYOD - Relevant FreePint Resources
- Link to this page
- View printable version
- BYOD Brings Challenges to IT Departments
Wednesday, 13th August 2014 - The Internet of Things - Protect Your Wearable Technology
Monday, 11th August 2014 - Keeping Track of Your Data - Identifying the Threats
Tuesday, 5th August 2014 - Personal and Professional Identities Merge: Bring Your Own ID
Thursday, 5th June 2014 - Whose Identity Is It Anyway?
Wednesday, 14th May 2014 - Security Breaches? It's the Innocent Ones You Need To Worry About
Wednesday, 12th March 2014 - Cyber Security in the Enterprise
Thursday, 9th January 2014 - Large Software Vendors Bet on BYOD
Friday, 3rd January 2014
From information retrieval to integrated intelligence - with Dow Jones
23rd January 2025
AI contracting and licensing; Strategic information managers; End-user training
10th December 2024
- Jinfo Community session (TBC - Mar 2025) (Community) 20th March 2025
- Jinfo Community session (TBC - Feb 2025) (Community) 25th February 2025
- From information retrieval to integrated intelligence - with Dow Jones (Community) 23rd January 2025