Beiträge verschlagwortet mit mobile

Highlights

What We're Reading, Week of 1/3

Ars Technica, How to Stay Safe at a Public Wi-Fi Hotspot

2011 Security Resolutions
Industry Commentary

2011: Security Resolutions

It’s Jan, 2011 – the start of a new year – the time when people kick their old habits and form new and improved ones.  On a personal level, many decide to join a gym, get more organized or even travel...

cannon
Expert Q&A

Conversation with Thomas Cannon on Android Security, Part 3

VPN Haus continues its conversation with Thomas Cannon, a security researcher who made news last month when he discovered a vulnerability on the Android OS that could make devices susceptible to data...

Highlights

What We're Reading, Week of 12/20

Information Week, 10 Steps To Mobile Worker Support

Highlights

What We're Reading, Week of 12/20

Information Week, 10 Steps To Mobile Worker Support

ShahidShah
Expert Q&A · HIPAA · Industry Commentary · Mobile

Conversation with Shahid Shah on mHealth, Part 4

This week, we feature the final post in our series with Shahid Shah, an enterprise software analyst that specializes in healthcare IT with an emphasis on e-health, EMRs, data integration, and legacy...

cannon
Expert Q&A · Mobile

Conversation with Thomas Cannon on Android Security, Part 2

VPN Haus continues its conversation with Thomas Cannon, a security researcher who made news last month when he discovered a vulnerability on the Android OS that could make devices susceptible to data...

cannon
Expert Q&A · Industry Commentary · Mobile

Conversation with Thomas Cannon on Android Security, Part 1

Thomas Cannon, a security researcher, made news last month when he discovered a vulnerability on the Android OS that could make  its devices susceptible to data theft. After finding the threat, Cannon...

Highlights

What We're Reading, Week of 11/22

Enterprise Networking Planet, Seven Security Policies for the IPv6 Network of the Future

Highlights

What We're Reading, Week of 11/22

Enterprise Networking Planet, Seven Security Policies for the IPv6 Network of the Future

Diese Webseite verwendet Cookies

Wir verwenden Cookies, um Inhalte zu personalisieren und die Zugriffe auf unsere Website zu analysieren. Weitere Informationen finden Sie in unserer Datenschutzerklärung.

OK