Commentary: Managing security in a mobile world
The security vulnerabilities introduced by untracked and unmanaged mobile computing devices are significant but certainly not insurmountable.
Samuel Kariuki
