Mobile Security: Goals and Frequent Misses

Most organizations got into mobile computing at the hands of the folks in the various business units, and security was an afterthought. However, recent history has shown numerous incidents that have occurred as a result of not properly addressing mobile computing security.


Kevin Beaver, a wise information security guru, along with being an all around good guy and my co-author for The Practical Guide to HIPAA Privacy and Security Compliance, just posted some links to some really great articles he wrote about mobile computing security. Along with these articles, you can also see some insightful articles he wrote about how to get sofware developers to address security, and some information about Microsoft licensing for security pros.
Check out Kevin’s articles and blog often for some valuable information security tips!

Tags: , , , , , , ,

Leave a Reply