Cyber Security, Cybercrime, BYOD - Relevant FreePint Resources
Jinfo Blog
25th August 2014
Abstract
We highlight FreePint's articles and reviews around cybercrime, cyber security, Bring Your Own Device (BYOD) and Bring Your Own Identity (BYOID).
Item
We recently had a query from a FreePint Subscriber about FreePint resources on cybercrime, cyber security, BYOD and BYOID.
We responded with a bespoke summary of our relevant articles, reviews and series.
If you have similar interests, you'll find this blog useful for navigating the full range of resources FreePint offers. Firstly we categorised the query into various aspects:
- Cybercrime; cyber security
- BYOID and BYOD
- Reviews.
We then highlighted the most relevant content under each heading:
Cybercrime; Cyber Security
- The Internet of Things - Protect Your Wearable Technology
- Keeping Track of Your Data - Identifying the Threats
- Privileged Users and Threats to Confidential Data
- We're All Hackers Now
- Cybercrime - Don't Waste a Crisis
- Security Breaches? It's the Innocent Ones You Need To Worry About
- Cyber Security in the Enterprise
- Hacking - Risk or Opportunity?
BYOID and BYOD
- BYOD Brings Challenges to IT Departments
- Personal and Professional Identities Merge: Bring Your Own ID
- Forget BYOD and COPE, It's Time for BYOID
- Whose Identity Is It Anyway?
- Large Software Vendors Bet on BYOD
Reviews
Editor's Note
Order your FreePint Subscription and gain access to the full archive of FreePint Articles and Reports, plus have the ability to share these resources with anyone else at your organisation.
- Blog post title: Cyber Security, Cybercrime, BYOD - Relevant FreePint Resources
- Link to this page
- View printable version
- BYOD Brings Challenges to IT Departments
Wednesday, 13th August 2014 - The Internet of Things - Protect Your Wearable Technology
Monday, 11th August 2014 - Keeping Track of Your Data - Identifying the Threats
Tuesday, 5th August 2014 - Personal and Professional Identities Merge: Bring Your Own ID
Thursday, 5th June 2014 - Whose Identity Is It Anyway?
Wednesday, 14th May 2014 - Security Breaches? It's the Innocent Ones You Need To Worry About
Wednesday, 12th March 2014 - Cyber Security in the Enterprise
Thursday, 9th January 2014 - Large Software Vendors Bet on BYOD
Friday, 3rd January 2014
Community session
11th December 2024
2025 strategic planning; evaluating research reports; The Financial Times, news and AI
5th November 2024
How are information managers getting involved with AI? Navigating privacy, ethics, and intellectual property
- 2025 strategic planning; evaluating research reports; The Financial Times, news and AI
5th November 2024 - All recent Jinfo Subscription content
31st October 2024 - End-user training best practice research
24th October 2024
- Jinfo Community session (TBC) (Community) 23rd January 2025
- Clinic on contracting for AI (Community) 11th December 2024
- Discussing news and AI strategies with the Financial Times (Community) 21st November 2024