encrypted storage - 1 articles

April 22, 2024
Mark Chimley, an Information Assurance Architect and Cyber Security Consultant asks “What are reasonable mobile computing security procedures?” Working on the MoveI am writing this on a train using mobile computing devices (a netbook and a phone) and I’m fairly happy with the security measures I’ve put in place and the procedures I’m using to enable mobile ... Read more