Information Security Leader, Author, Instructor and Speaker

Default utility Image

App container, app wrapping and other emerging mobile security tactics TAGS: | | The flood of personal devices entering organizations through both formal bring your own device programs and informal use of personal …Continue reading →

Default utility Image

BYOD and compliance harmony: Myth or reality? TAGS: | | Mobile device usage has exploded in the enterprise, and many companies have developed Bring Your Own Device (BYOD) policies for …Continue reading →