Information Security Leader, Author, Instructor and Speaker

Default utility Image

Mobile security trends: app containers, app wrapping for BYOD TAGS: | | One of the more important mobile security trends of recent years has to do with the flood of personal devices …Continue reading →

Default utility Image

Understanding PCI mobile application development guidelines TAGS: | The Payment Card Industry Security Standards Council (PCI DSS) recently released the long awaited PCI mobile payment acceptance security guidelines.  …Continue reading →

Default utility Image

PCI Council issues mobile payment guidance: Now what? TAGS: | | Small businesses around the world are jumping on the credit card bandwagon due to new technologies that allow the acceptance …Continue reading →

Default utility Image

Securing Mobile Devices with Containers TAGS: | | Chances are that right now, there are hundreds or thousands of individuals around the world carrying mobile devices that hold …Continue reading →

Default utility Image

Multifactor Authentication and Smartphones TAGS: | For decades, organizations have used security tokens to provide added security for sensitive IT resources.  Traditionally, these keyfobs were small …Continue reading →

Default utility Image

Securing Mobile Endpoints TAGS: For years, organizations insisted on institutional ownership and control of computing devices used by employees to access business information.  Strict …Continue reading →