New Smartphones and the Risk Picture
Mobile phone platforms are susceptible to malicious attacks, both from the network and upon physical compromise. Understanding the vectors of such attacks, level of expertise required to carry them out, available mitigations, and impact of compromise provides a background for certain risk...
01 April 2012 2 page(s) pdf
Mobile Device Management: A Risk Discussion for IT Decision Makers
Th is document describes the high-level architecture and capabilities of MDM solutions, and introduces key security issues to consider when deploying them.
01 August 2012 5 page(s) pdf
2014 IAD's Top Technology Challenges
This document is a list of IAD's top technology challenges in 2014.
06 July 2014 1 page(s) pdf
Add all new keywords to this page so they will show in the keyword list for all pages below.
22 December 2015
1-4 of 4 results returned for: "keywords:"Portfolio Management""