In this article we will cover testing of applications.
In this article series we will consider and cover ways in which the organisation can assess mobile applications to improve security when mobile devices are used for corporate function.
In this, Part 6, we're going to talk about how you can use robust auditing and reporting capabilities for your BYOD environment to make your network more secure and to […]
In this, Part 5, we'll move on to the discussion of BYOD compliance with government and industry security and privacy standards.
In this Part 4, we'll take up the discussion where we left off in the last article and offer some thoughts about the need for your BYOD strategy to support […]
In this article we'll finish our coverage of the BYOD solution requirements and the meaning and intent behind them.
In this article, we'll being our planning process by discussing a collection of solution requirements that cuts across all secure BYOD deployments.
In the first part of this series on planning considerations for security BYOD and consumerization of IT, we'll look at the BYOD problem domain and discuss key aspects of planning […]
This article will go beyond previous discussions on this site about mobile security threats and examine how you may be able to tame the emerging monster that BYOD is becoming. […]