SearchSecurity: Mobile security strategy matures with BYOD

2 June 2016

In addition to mapping out use cases, it is important to have an inventory of the devices and different versions of mobile OSes that connect to your network, according to Rick Holland.