Global Security University: Mobile Device Security Classroom
sponsored by SearchSecurity.com

MOBILE DEVICE SECURITY: Is mobile hacking so far-fetched? – We’re quickly approaching that tipping point with mobile devices where attackers are spending more time poking and prodding the various mobile platforms in play inside enterprises looking for exploitable weaknesses. Meanwhile, consumerization of IT is a burden for IT management and operations to contend with and attackers are preparing to take full advantage, especially as more mission-critical business is done on mobile platforms, especially open platforms such as Android. This security school will examine the threats hackers pose to mobile devices such as smartphones and tablets, the various mobile security technologies available to ward off malware, and what policy decisions you need to consider around personal devices and corporate data stored and accessed by consumer devices.

Sponsored by: IBM

(THIS RESOURCE IS NO LONGER AVAILABLE.)
 
Available Resources from SearchSecurity.com
See what other users are reading via our Daily Top 50 Report
.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement