By Rob Waugh posted 7 Mar 2013 at 08:10PM
Presented at the Virus Bulletin 2012 conference in September, this paper considers the pros and cons of the BYOD trend, potential attack vectors, and advice on countermeasures. First published in Virus Bulletin 2012 Conference Proceedings*
Comments are closed.
Automatically receive new posts via email:
Delivered by FeedBurner