The vulnerability with active exploitations allows local non-privileged users to access freed-up memory for staging new attacks.| CSO Online
While BYOD made it easier for employees to get their jobs done anywhere, anytime, keeping company data safe requires serious management. Here's how to pick between Mobile Application Management and Mobile Device Management.| Computerworld
When it comes to keeping everyone in the company on the same page, IT could be doing more. That's especially true when making sure mobile devices are secured.| Computerworld