By: Nigel Stanley, Practice Leader - IT Security, Bloor Research
Published: 8th May 2012
Copyright Bloor Research © 2012
Computing have a good piece summarising the panel I ran at InfoSec 2012 My issue was around the jailbreaking of devices. If a user is motivated and capable of jailbreaking a device what else could they be doing to your network?
The full article is here http://www.computing.co.uk/ctg/news/2170534/infosec-jailbroken-devices-threat-network
We have not received any comments against this entry. Why not be the first?
We automatically stop accepting comments 180 days after a post is published. If you would like to know more about this subject, please contact us and we'll try to help.
Published by: IT Analysis Communications Ltd.
T: +44 (0)190 888 0760 | F: +44 (0)190 888 0761