Information Security Leader, Author, Instructor and Speaker

Default utility Image

Securing employee smartphones: iPhone security settings, deployments TAGS: | Until recently, the iPhone was viewed more as a novelty that appealed to end users than as a serious business …Continue reading →

Default utility Image

Bringing Security to Smartphones TAGS: | Where is your sensitive business data right now? Chances are a good portion of it is on the road or …Continue reading →