Mobile Device Security
Submitted by manager on Thu, 03/31/2016 - 10:32

Contributed by Dietrich Lehr
I will be focusing on mobile device security as it pertains to methodologies used to secure critical components of smartphone use. I will analyze and compare the two smartphone platform leaders, Apple and Android and the way they secure their devices. I will also provide insight as to which methods may be stronger and better for users to implement chose if multiple options are available.
This document is in PDF format. To view it click here.
Rate this article:
Breaking out of Prison is easier than you think
Understanding Phishing and Protecting the 8th Layer
The Journey from Unmanaged to a Managed Risk Management Program
Responsibilities and Considerations in Secrets Management