The bring-your-own-device phenomenon has swept global businesses, and the challenge only intensifies with every new wave of smart phones, tablets and portable storage devices. It's no longer a question of whether organizations will allow employees to use their own mobile devices. That's already happening. The real question is: How will you secure their usage?
Mobile security is the cover story of this 2012 edition of Information Security Media Group's Security Agenda - our annual overview of the year's top priorities. Included in this feature package are:
- BYOD: How to Minimize Risk
- How to Enforce Your Mobile Policy
- How to Manage the Risks of Mobility