Content Copyright © 2012 Bloor. All Rights Reserved.
Also posted on: Nigel Stanley
Computing have a good piece summarising the panel I ran at InfoSec 2012 My issue was around the jailbreaking of devices. If a user is motivated and capable of jailbreaking a device what else could they be doing to your network?
The full article is here http://www.computing.co.uk/ctg/news/2170534/infosec-jailbroken-devices-threat-network