Mobile Insecurity: A practical guide to threats and vulnerabilities


Bluefire Security Technologies – Mobile and wireless applications represent a tremendous opportunity for enterprise users. However, security is a critical issue. This white paper outlines the threats and vulnerabilities and outlines 10 steps that enterprises can take to overcome mobile handheld vulnerabilities and deter threats. (In PDF format; free registration required.)

continue -->

ITWorld DealPost: The best in tech deals and discounts.
View Comments
You Might Like
Join the discussion
Be the first to comment on this article. Our Commenting Policies