Mobile devices are the new network perimeter: Can they be secured?
If you have even one employee with a mobile device connecting to your network, the implications for your perimeter security are serious. The mobile devices we all know and love are great for productivity, but they have completely changed the vulnerability state of our networks. Learn what we have to fear and what measures we can take to solve the mobile edge security problem in this article by Norm Laudermilch.
Article title: Will cell phones be responsible for the next Internet worm?
Author: Norm Laudermilch
Pub Date:April 28, 2006
Copyright 2007, Pearson Education Inc. InformIT. All rights reserved. Used with permission from the publisher, Pearson/InformIT.