News, views, and insight from the ESET security community
By Rob Waugh posted 7 Mar 2013 - 08:10PM
Presented at the Virus Bulletin 2012 conference in September, this paper considers the pros and cons of the BYOD trend, potential attack vectors, and advice on countermeasures. First published in Virus Bulletin 2012 Conference Proceedings*
Comments are closed.
Sign up to our newsletter
The latest security news direct to your inbox
Add this code to your site