Half Sized Blog Element (Single Author Style)

Half Sized Blog Element (Multi Author Style)

This is a standard post format with preview Picture

Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Aenean commodo ligula eget dolor. Aenean massa. Cum sociis natoque penatibus et magnis dis parturient montes, nascetur ridiculus mus. Donec quam felis, ultricies nec, pellentesque eu, pretium quis, sem. Nulla consequat massa quis enim. Donec pede justo, fringilla vel, aliquet nec, vulputate eget, arcu. In enim justo, […]

SANS Mobile Device Security Summit 2012: The Growing and Constantly Changing Challenge

Mobile Devices continue to evolve, and with each development there are becoming more efficient tools employees increasingly rely on to conduct both their corporate and personal business. Portable applications that allow the user to access sensitive corporate data are prime targets for hackers and provide them a wide range of access port to data. Controlling security breaches of mobile devices is complex due to the varying software and device types. Additionally, many organizations have no restrictions on the use of personal devices.

This is a standard post format with preview Picture

Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Aenean commodo ligula eget dolor. Aenean massa. Cum sociis natoque penatibus et magnis dis parturient montes, nascetur ridiculus mus. Donec quam felis, ultricies nec, pellentesque eu, pretium quis, sem. Nulla consequat massa quis enim. Donec pede justo, fringilla vel, aliquet nec, vulputate eget, arcu. In enim justo, […]

SANS Mobile Device Security Summit 2012: The Growing and Constantly Changing Challenge

Mobile Devices continue to evolve, and with each development there are becoming more efficient tools employees increasingly rely on to conduct both their corporate and personal business. Portable applications that allow the user to access sensitive corporate data are prime targets for hackers and provide them a wide range of access port to data. Controlling security breaches of mobile devices is complex due to the varying software and device types. Additionally, many organizations have no restrictions on the use of personal devices.