Information Security Leader, Author, Instructor and Speaker

Default utility Image

Securing Mobile Devices with Containers TAGS: | | Chances are that right now, there are hundreds or thousands of individuals around the world carrying mobile devices that hold …Continue reading →

Default utility Image

Mobile Device Management TAGS: Walking the corridors of any organization these days reveals heads buried in all manner of smartphones and tablet PCs.  Whether …Continue reading →