Securing the Mobile Enterprise

August 26, 2009

What is this blog about?

Filed under: Mobile Security — Balaji Prasad @ 2:37 am
Tags: , , , , ,

Today’s smart phones offer as much processing power as personal computers from half a decade ago. These devices and the complimenting apps offer incredible flexibility in processing and pulling information from the cloud around us, yet at the same time they expose us to new and unique attack vectors that can compromise the sensitive and often personal nature of data resident on the phone.
Security Vendors are furiously developing solutions that address this up and coming threat. In this blog I will discuss this exciting new frontier that will prove to be the next battleground between the good guys and the bad.


Leave a Comment »

No comments yet.

RSS feed for comments on this post. TrackBack URI

Leave a Reply

Please log in using one of these methods to post your comment: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s

Create a free website or blog at

%d bloggers like this: