Don't be fooled by typical mobile device management (MDM) rhetoric. There's more than one way to manage a mobile device. You don't have to lock-in to a single vendor nor do you have to "beat to fit ...
COMPUTER security is a contradiction in terms. Consider the past year alone: cyberthieves stole $81m from the central bank of Bangladesh; the $4.8bn takeover of Yahoo, an internet firm, by Verizon, a ...
To identify and remediate software vulnerabilities, I would advise any security professional to “do the basics brilliantly”. Namely, identify and contain the vulnerability before it metastasizes. This ...