STO_STRATEGY
27 views | +0 today
Follow
STO_STRATEGY
A system relying on security through obscurity may have theoretical or actual security vulnerabilities, but its owners or designers believe that the flaws are not known, and that attackers are unlikely to find them. The basis of STO has always been to run your system on a “need to know” basis. If a person doesn’t know how to do something which could impact system security, then s/he isn’t dangerous. The technique stands in contrast with security by design.
Curated by STO STRATEGY
Your new post is loading...
Your new post is loading...
Scooped by STO STRATEGY
Scoop.it!

Materials Updated / Academic publications

Materials Updated / Academic publications | STO_STRATEGY | Scoop.it
Blog about academic publications was recently updated.

Publications [ Academic ] Featured May 15, 2014 academic publication, ITA
ITA, cloud, cloud security STO STRATEGY May 15, 2014 academic publication,
ITA ITA, cloud, cloud security STO STRATEGY SECURITY COMPLIANCE CHALLENGES
ON CLOUDS May 15, 2014 academic publication, ITA ITA, cloud, cloud security
STO STRATEGY May 15, 2014 academic publication, ITA ITA, cloud, cloud
security STO STRATEGY May 15, 2014 academic publication, ITA ITA, cloud,
cloud security STO STRATEGY May 15, 2014 academic publication, ITA ITA,
cloud, cloud security STO STRATEGY May 15, 2014 academic publication,
I-Society, Infonomics Society I-Society, cloud, cloud security STO STRATEGY
May 15, 2014 academic publication, I-Society, Infonomics Society I-Society
, cloud, cloud security STO STRATEGY Limitations of Security Standards
against Public Clouds May 15, 2014 academic publication, I-Society,
Infonomics Society I-Society, cloud, cloud security STO STRATEGY May 15,
2014 academic publication, I-Society, Infonomics Society I-Society, cloud,
cloud security STO STRATEGY May 15, 2014 academic publication, I-Society,
Infonomics Society I-Society, cloud, cloud security STO STRATEGY May 15,
2014 academic publication, I-Society, Infonomics Society I-Society, cloud,
cloud security STO STRATEGY May 15, 2014 academic publication, ICITST,
Infonomics Society ICITST, BlackBerry, Mobile, Mobile Security, conference
STO STRATEGY May 15, 2014 academic publication, ICITST, Infonomics Society
ICITST, BlackBerry, Mobile, Mobile Security, conference STO STRATEGY
Vulnerability Elimination by Force of New Mobile OS Comparative Research of
Security Techniques on BlackBerry OS (incl. PlayBook) May 15, 2014
academic publication, ICITST, Infonomics Society ICITST, BlackBerry,
Mobile, Mobile Security, conference STO STRATEGY May 15, 2014 academic
publication, ICITST, Infonomics Society ICITST, BlackBerry, Mobile, Mobile
Security, conference STO STRATEGY May 15, 2014 academic publication,
ICITST, Infonomics Society ICITST, BlackBerry, Mobile, Mobile Security,
conference STO STRATEGY May 15, 2014 academic publication, ICITST,
Infonomics Society ICITST, BlackBerry, Mobile, Mobile Security, conference
STO STRATEGY
more...
No comment yet.
Scooped by STO STRATEGY
Scoop.it!

EMM as a Security Approach - Part III. Forensics achievements

EMM as a Security Approach - Part III. Forensics achievements | STO_STRATEGY | Scoop.it
Is that really difficult to access application data ? We definitely know
that forensics techniques have been good to find certain tracks on mobile
phone. So, what capabilities does it provide in the scope of applications?
Here we go with solutions like Elcomsoft, Oxygen Forensics, Via Forensics
and so on
more...
No comment yet.
Scooped by STO STRATEGY
Scoop.it!

17-18th June 2014, Olympia National, London

17-18th June 2014, Olympia National, London | STO_STRATEGY | Scoop.it
Enterprise Apps Conference & Event: Apps World, one of the world’s leading
multi-platform events in the apps industry brings you Enterprise Apps
World. A two day show, co-hosted with Cloud World Forum, that will look at
all the implications of going mobile in the workplace and how enterprise
apps can help.
more...
No comment yet.
Scooped by STO STRATEGY
Scoop.it!

Bypassing SSL Pinning on Android via Reverse Engineering

Bypassing SSL Pinning on Android via Reverse Engineering | STO_STRATEGY | Scoop.it
Bypassing SSL Pinning on Android via Reverse Engineering
more...
No comment yet.
Scooped by STO STRATEGY
Scoop.it!

IM Data Leakage - Part I

IM Data Leakage - Part I | STO_STRATEGY | Scoop.it
Latest news on data leakage claims that every second mobile application
does not comply with internationally accepted privacy principles. Recently,
Whatsapp was noticed about weak backup encryption that gives a cause for a 
special tool development and two years ago about weak data-motion
protection exposing usernames, telephone numbers and messages. What else IM
messenger could reveal. 

Let's examine Whatsapp & Viber data-in-rest leakage.
more...
No comment yet.
Scooped by STO STRATEGY
Scoop.it!

EMM as a Security Approach - Part I

What is EMM by now ? Enterprise mobility management is extremely layered
management framework to manage each dimension of so-called mobile
computing. It includes well-known financial & risk management. It has come
from MEM (mobile email management), went through the MDM (mobile device
management) and transformed into solid term EMM.
What technologies are part of EMM:

* AV: Anti-viruses Solution... extended to Security Awareness Approach
in a certain way
* Mobile SIEM: Log Management Solution is not nothing new, just common
technology adopted to mobile specifics
* DLP: Data-Leakage Prevention is almost of old & rarely changed
technology
* NAC: Network Access Control is a unified technology to management
network-related IAM (identity & access management) solutions

What technologies are quite new to EMM and more native than those listed
before:

* MEM: Mobile Email Management is a specific set of 'features' is good
to use mobile device in alignment of certain entry-point like MS
Exchange
* MDM: Mobile Device Management is the most popular solution by now. It
commonly deploys to enforce any kind of policies.
* MAM: Mobile Application Management is new one similar to MEM but goes
beyond of email application 
* MIM: Mobile Information Management is the next logical level of
managing the information and how mobile devices use it.

EMM Key Components

* Mobile Platforms Supporting Management
* Mobile Device Management
* Application Management
* Security Management
* Document/Content Management
* Network Management
* Service Management
* Integration with PC Management tools
* Reporting Management
more...
No comment yet.
Scooped by STO STRATEGY
Scoop.it!

Materials Updated / Non-academic publications

Materials Updated / Non-academic publications | STO_STRATEGY | Scoop.it
Blog about non-academic publications was recently updated.

Publications [ Non-academic ] Featured May 15, 2014 non-academic
publication, PenTest Magazine pentest magazine, Penter Career STO STRATEGY
May 15, 2014 non-academic publication, PenTest Magazine pentest magazine,
Penter Career STO STRATEGY Pen test career. how to begin May 15, 2014
non-academic publication, PenTest Magazine pentest magazine, Penter Career
STO STRATEGY May 15, 2014 non-academic publication, PenTest Magazine
pentest magazine, Penter Career STO STRATEGY May 15, 2014 non-academic
publication, PenTest Magazine pentest magazine, Penter Career STO STRATEGY
May 15, 2014 non-academic publication, PenTest Magazine pentest magazine,
Penter Career STO STRATEGY May 15, 2014 non-academic publication,
eForensics Magazine eForensics, Forensics, mobile forensics, BlackBerry,
Android STO STRATEGY May 15, 2014 non-academic publication, eForensics
Magazine eForensics, Forensics, mobile forensics, BlackBerry, Android STO
STRATEGY State of art of mobile forensics May 15, 2014 non-academic
publication, eForensics Magazine eForensics, Forensics, mobile forensics,
BlackBerry, Android STO STRATEGY May 15, 2014 non-academic publication,
eForensics Magazine eForensics, Forensics, mobile forensics, BlackBerry,
Android STO STRATEGY May 15, 2014 non-academic publication, eForensics
Magazine eForensics, Forensics, mobile forensics, BlackBerry, Android STO
STRATEGY May 15, 2014 non-academic publication, eForensics Magazine
eForensics, Forensics, mobile forensics, BlackBerry, Android STO STRATEGY
Mar 11, 2013 non-academic publication, Groteck Business Media forensics,
mobile forensics, dead forensics, live forensics, mobile Yury Chemerkin
Mar 11, 2013 non-academic publication, Groteck Business Media forensics,
mobile forensics, dead forensics, live forensics, mobile Yury Chemerkin
Comparative Analysis on Forensics Mar 11, 2013 non-academic publication,
Groteck Business Media forensics, mobile forensics, dead forensics, live
forensics, mobile Yury Chemerkin Mar 11, 2013 non-academic publication,
Groteck Business Media forensics, mobile forensics, dead forensics, live
forensics, mobile Yury Chemerkin Mar 11, 2013 non-academic publication,
Groteck Business Media forensics, mobile forensics, dead forensics, live
forensics, mobile Yury Chemerkin Mar 11, 2013 non-academic publication,
Groteck Business Media forensics, mobile forensics, dead forensics, live
forensics, mobile Yury Chemerkin Mar 11, 2013 PenTest Magazine,
non-academic publication amazon web services, aws, cloud, security,
compliance Yury Chemerkin Mar 11, 2013 PenTest Magazine, non-academic
publication amazon web services, aws, cloud, security, compliance Yury
Chemerkin AWS Cloud Security From the Point of View of the Compliance Mar
11, 2013 PenTest Magazine, non-academic publication amazon web services,
aws, cloud, security, compliance Yury Chemerkin Mar 11, 2013 PenTest
Magazine, non-academic publication amazon web services, aws, cloud,
security, compliance Yury Chemerkin Mar 11, 2013 PenTest Magazine,
non-academic publication amazon web services, aws, cloud, security,
compliance Yury Chemerkin Mar 11, 2013 PenTest Magazine, non-academic
publication amazon web services, aws, cloud, security, compliance Yury
Chemerkin Mar 11, 2013 PenTest Magazine, non-academic publication pentest
magazine, yury chemerkin, interview Yury Chemerkin Mar 11, 2013 PenTest
Magazine, non-academic publication pentest magazine, yury chemerkin,
interview Yury Chemerkin Interview Pentest Mar 11, 2013 PenTest Magazine,
non-academic publication pentest magazine, yury chemerkin, interview Yury
Chemerkin Mar 11, 2013 PenTest Magazine, non-academic publication pentest
magazine, yury chemerkin, interview Yury Chemerkin Mar 11, 2013 PenTest
Magazine, non-academic publication pentest magazine, yury chemerkin,
interview Yury Chemerkin Mar 11, 2013 PenTest Magazine, non-academic
publication pentest magazine, yury chemerkin, interview Yury Chemerkin Feb
22, 2013 Hakin9 Magazine, non-academic publication BlackBerry Playbook,
Mobile Security Yury Chemerkin Feb 22, 2013 Hakin9 Magazine, non-academic
publication BlackBerry Playbook, Mobile Security Yury Chemerkin Blackberry
playbook – new challenges Feb 22, 2013 Hakin9 Magazine, non-academic
publication BlackBerry Playbook, Mobile Security Yury Chemerkin Feb 22,
2013 Hakin9 Magazine, non-academic publication BlackBerry Playbook, Mobile
Security Yury Chemerkin Feb 22, 2013 Hakin9 Magazine, non-academic
publication BlackBerry Playbook, Mobile Security Yury Chemerkin Feb 22,
2013 Hakin9 Magazine, non-academic publication BlackBerry Playbook, Mobile
Security Yury Chemerkin Feb 22, 2013 Hakin9 Magazine, non-academic
publication BlackBerry, Mobile Security Yury Chemerkin Feb 22, 2013 Hakin9
Magazine, non-academic publication BlackBerry, Mobile Security Yury
Chemerkin When developer’s api simplify user mode rootkits developing. Feb
22, 2013 Hakin9 Magazine, non-academic publication BlackBerry, Mobile
Security Yury Chemerkin Feb 22, 2013 Hakin9 Magazine, non-academic
publication BlackBerry, Mobile Security Yury Chemerkin Feb 22, 2013 Hakin9
Magazine, non-academic publication BlackBerry, Mobile Security Yury
Chemerkin Feb 22, 2013 Hakin9 Magazine, non-academic publication
BlackBerry, Mobile Security Yury Chemerkin Feb 22, 2013 Hakin9 Magazine,
non-academic publication BlackBerry, Mobile Security Yury Chemerkin Feb 22,
2013 Hakin9 Magazine, non-academic publication BlackBerry, Mobile Security
Yury Chemerkin Does your black berry smartphone have ears. Feb 22, 2013
Hakin9 Magazine, non-academic publication BlackBerry, Mobile Security Yury
Chemerkin Feb 22, 2013 Hakin9 Magazine, non-academic publication
BlackBerry, Mobile Security Yury Chemerkin Feb 22, 2013 Hakin9 Magazine,
non-academic publication BlackBerry, Mobile Security Yury Chemerkin Feb 22,
2013 Hakin9 Magazine, non-academic publication BlackBerry, Mobile Security
Yury Chemerkin Feb 22, 2013 Hakin9 Magazine, non-academic publication
social network, privacy Yury Chemerkin Feb 22, 2013 Hakin9 Magazine,
non-academic publication social network, privacy Yury Chemerkin Social
Network Privacy II Feb 22, 2013 Hakin9 Magazine, non-academic publication
social network, privacy Yury Chemerkin Feb 22, 2013 Hakin9 Magazine,
non-academic publication social network, privacy Yury Chemerkin Feb 22,
2013 Hakin9 Magazine, non-academic publication social network, privacy
Yury Chemerkin Feb 22, 2013 Hakin9 Magazine, non-academic publication
social network, privacy Yury Chemerkin Feb 22, 2013 Hakin9 Magazine,
non-academic publication social network, privacy Yury Chemerkin Feb 22,
2013 Hakin9 Magazine, non-academic publication social network, privacy
Yury Chemerkin Social network privacy. Feb 22, 2013 Hakin9 Magazine,
non-academic publication social network, privacy Yury Chemerkin Feb 22,
2013 Hakin9 Magazine, non-academic publication social network, privacy
Yury Chemerkin Feb 22, 2013 Hakin9 Magazine, non-academic publication
social network, privacy Yury Chemerkin Feb 22, 2013 Hakin9 Magazine,
non-academic publication social network, privacy Yury Chemerkin Feb 22,
2013 Groteck Business Media, non-academic publication BlackBerry, Mobile
Security Yury Chemerkin Feb 22, 2013 Groteck Business Media, non-academic
publication BlackBerry, Mobile Security Yury Chemerkin Безопасность
BlackBerry-решений: уязвимости на стыке технологий Feb 22, 2013 Groteck
Business Media, non-academic publication BlackBerry, Mobile Security Yury
Chemerkin Feb 22, 2013 Groteck Business Media, non-academic publication
BlackBerry, Mobile Security Yury Chemerkin Feb 22, 2013 Groteck Business
Media, non-academic publication BlackBerry, Mobile Security Yury Chemerkin
Feb 22, 2013 Groteck Business Media, non-academic publication BlackBerry,
Mobile Security Yury Chemerkin Feb 22, 2013 Groteck Business Media,
non-academic publication cloud, cloud security, security Yury Chemerkin
Feb 22, 2013 Groteck Business Media, non-academic publication cloud, cloud
security, security Yury Chemerkin Проблемы новых парадигм и необходимости
новых подходов к управлению облачн… Feb 22, 2013 Groteck Business Media,
non-academic publication cloud, cloud security, security Yury Chemerkin
Feb 22, 2013 Groteck Business Media, non-academic publication cloud, cloud
security, security Yury Chemerkin Feb 22, 2013 Groteck Business Media,
non-academic publication cloud, cloud security, security Yury Chemerkin
Feb 22, 2013 Groteck Business Media, non-academic publication cloud, cloud
security, security Yury Chemerkin Feb 22, 2013 Hakin9 Magazine,
non-academic publication forensics, mobile forensics, Android, BlackBerry
Yury Chemerkin Feb 22, 2013 Hakin9 Magazine, non-academic publication
forensics, mobile forensics, Android, BlackBerry Yury Chemerkin Comparison
of android and black berry forensic techniques Feb 22, 2013 Hakin9 Magazine
, non-academic publication forensics, mobile forensics, Android,
BlackBerry Yury Chemerkin Feb 22, 2013 Hakin9 Magazine, non-academic
publication forensics, mobile forensics, Android, BlackBerry Yury Chemerkin
Feb 22, 2013 Hakin9 Magazine, non-academic publication forensics, mobile
forensics, Android, BlackBerry Yury Chemerkin Feb 22, 2013 Hakin9 Magazine
, non-academic publication forensics, mobile forensics, Android,
BlackBerry Yury Chemerkin Feb 22, 2013 Hakin9 Magazine, non-academic
publication social network, privacy Yury Chemerkin Feb 22, 2013 Hakin9
Magazine, non-academic publication social network, privacy Yury Chemerkin
Social network privacy guide Feb 22, 2013 Hakin9 Magazine, non-academic
publication social network, privacy Yury Chemerkin Feb 22, 2013 Hakin9
Magazine, non-academic publication social network, privacy Yury Chemerkin
Feb 22, 2013 Hakin9 Magazine, non-academic publication social network,
privacy Yury Chemerkin Feb 22, 2013 Hakin9 Magazine, non-academic
publication social network, privacy Yury Chemerkin Feb 22, 2013
non-academic publication, Hakin9 Magazine Yury Chemerkin Feb 22, 2013
non-academic publication, Hakin9 Magazine Yury Chemerkin Interview with
Yury Chemerkin Feb 22, 2013 non-academic publication, Hakin9 Magazine Yury
Chemerkin Feb 22, 2013 non-academic publication, Hakin9 Magazine Yury
Chemerkin Feb 22, 2013 non-academic publication, Hakin9 Magazine Yury
Chemerkin Feb 22, 2013 non-academic publication, Hakin9 Magazine Yury
Chemerkin Feb 22, 2013 non-academic publication, Hakin9 Magazine
BlackBerry, Mobile Security Yury Chemerkin Feb 22, 2013 non-academic
publication, Hakin9 Magazine BlackBerry, Mobile Security Yury Chemerkin
When developer’s api simplify user mode rootkits developing Feb 22, 2013
non-academic publication, Hakin9 Magazine BlackBerry, Mobile Security Yury
Chemerkin Feb 22, 2013 non-academic publication, Hakin9 Magazine
BlackBerry, Mobile Security Yury Chemerkin Feb 22, 2013 non-academic
publication, Hakin9 Magazine BlackBerry, Mobile Security Yury Chemerkin
Feb 22, 2013 non-academic publication, Hakin9 Magazine BlackBerry, Mobile
Security Yury Chemerkin Feb 22, 2013 non-academic publication, Hakin9
Magazine forensics, mobile forensics, blackberry Yury Chemerkin Feb 22,
2013 non-academic publication, Hakin9 Magazine forensics, mobile forensics
, blackberry Yury Chemerkin To get round to the heart of fortress Feb 22,
2013 non-academic publication, Hakin9 Magazine forensics, mobile forensics
, blackberry Yury Chemerkin Feb 22, 2013 non-academic publication, Hakin9
Magazine forensics, mobile forensics, blackberry Yury Chemerkin Feb 22,
2013 non-academic publication, Hakin9 Magazine forensics, mobile forensics
, blackberry Yury Chemerkin Feb 22, 2013 non-academic publication, Hakin9
Magazine forensics, mobile forensics, blackberry Yury Chemerkin Feb 22,
2013 non-academic publication, Hakin9 Magazine BlackBerry, Mobile Security
Yury Chemerkin Feb 22, 2013 non-academic publication, Hakin9 Magazine
BlackBerry, Mobile Security Yury Chemerkin Does your black berry smartphone
have ears Feb 22, 2013 non-academic publication, Hakin9 Magazine
BlackBerry, Mobile Security Yury Chemerkin Feb 22, 2013 non-academic
publication, Hakin9 Magazine BlackBerry, Mobile Security Yury Chemerkin
Feb 22, 2013 non-academic publication, Hakin9 Magazine BlackBerry, Mobile
Security Yury Chemerkin Feb 22, 2013 non-academic publication, Hakin9
Magazine BlackBerry, Mobile Security Yury Chemerkin Feb 22, 2013
non-academic publication, Hakin9 Magazine BlackBerry, Mobile Security Yury
Chemerkin Feb 22, 2013 non-academic publication, Hakin9 Magazine
BlackBerry, Mobile Security Yury Chemerkin Why is password protection a
fallacy a point of view Feb 22, 2013 non-academic publication, Hakin9
Magazine BlackBerry, Mobile Security Yury Chemerkin Feb 22, 2013
non-academic publication, Hakin9 Magazine BlackBerry, Mobile Security Yury
Chemerkin Feb 22, 2013 non-academic publication, Hakin9 Magazine
BlackBerry, Mobile Security Yury Chemerkin Feb 22, 2013 non-academic
publication, Hakin9 Magazine BlackBerry, Mobile Security Yury Chemerkin
Feb 22, 2013 non-academic publication, Hakin9 Magazine BlackBerry, Mobile
Security Yury Chemerkin Feb 22, 2013 non-academic publication, Hakin9
Magazine BlackBerry, Mobile Security Yury Chemerkin The Backroom Message
That’s Stolen Your Deal Feb 22, 2013 non-academic publication, Hakin9
Magazine BlackBerry, Mobile Security Yury Chemerkin Feb 22, 2013
non-academic publication, Hakin9 Magazine BlackBerry, Mobile Security Yury
Chemerkin Feb 22, 2013 non-academic publication, Hakin9 Magazine
BlackBerry, Mobile Security Yury Chemerkin Feb 22, 2013 non-academic
publication, Hakin9 Magazine BlackBerry, Mobile Security Yury Chemerkin
Feb 22, 2013 Yury Chemerkin Feb 22, 2013 Yury Chemerkin Is Data Secure On
The Password Protected Blackberry Device Feb 22, 2013 Yury Chemerkin Feb
22, 2013 Yury Chemerkin Feb 22, 2013 Yury Chemerkin Feb 22, 2013 Yury
Chemerkin Feb 22, 2013 Yury Chemerkin Feb 22, 2013 Yury Chemerkin A
Security System That Changed The World Feb 22, 2013 Yury Chemerkin Feb 22,
2013 Yury Chemerkin Feb 22, 2013 Yury Chemerkin Feb 22, 2013 Yury Chemerkin
more...
No comment yet.
Scooped by STO STRATEGY
Scoop.it!

CYBER INTELLIGENCE EUROPE 2014

CYBER INTELLIGENCE EUROPE 2014 | STO_STRATEGY | Scoop.it
With the ever growing threat of cyber-attacks on government critical
infrastructure there is no better time to come together and discuss the
latest threats being seen to breach public sector computer systems.
European governments are now working together and with the private sector
to strengthen their defence.
more...
No comment yet.
Scooped by STO STRATEGY
Scoop.it!

CYBER SECURITY FOR OIL AND GAS | June 18- 18, 2014 | Houston, Texas

CYBER SECURITY FOR OIL AND GAS | June 18- 18, 2014 | Houston, Texas | STO_STRATEGY | Scoop.it
IQPC 2nd Annual Cyber Security for Oil and Gas Summit  will address the
major cyber security issues facing the oil and gas industry as a whole and
will provide a platform for IT and cyber security professionals to share
their wisdom, experience, and thoughts on the future of this complex and
often unknown threat to their enterprises.

For more information on speakers view brochure here (http://bit.ly/1c22jw1
)

Don’t forget to mention promo code CYBER_HAKIN to receive a 20% DISCOUNT!
more...
No comment yet.
Scooped by STO STRATEGY
Scoop.it!

Reverse Engineering of x86 Linux Shellcodes the Easy Way

Reverse Engineering of x86 Linux Shellcodes the Easy Way | STO_STRATEGY | Scoop.it
Grabbed from Exploit-DB

Reverse Engineering of x86 Linux Shellcodes the Easy Way
more...
No comment yet.
Scooped by STO STRATEGY
Scoop.it!

Jobs [Nu|lCon]

Jobs [Nu|lCon] | STO_STRATEGY | Scoop.it
Application / Senior Application Developer 

at CipherCloud India Pvt Ltd in Hyderabad (Published at 19-05-2014)

Job Responsibilities:
Review and analyze business requirements
Estimate and plan implementation effort for key product features
Write design diagrams, technical specifications and documentation
Write high-quality code with emphasis on security, performance, and
scalability
Participate actively and contribute to design and development discussions
Perform technical analysis to present pros and cons of various solutions to
management
Work closely with off-shore development and other team members to resolve
technical issues and coordinate builds/releases
Mentor junior team members as and when necessary .
more...
No comment yet.
Scooped by STO STRATEGY
Scoop.it!

EMM as a Security Approach - Part II. Popular misconceptions of MDM and Mobile Security

EMM as a Security Approach - Part II. Popular misconceptions of MDM and Mobile Security | STO_STRATEGY | Scoop.it
Participating at different conferences and events, it was noticed lots of
misconceptions about different security frameworks. It happened when
someone applies and uses solutions in wrong way or present disadvantages of
these solutions are. Let me share a set of most popular fails on MDM and
Mobile Security that usually might be get by specialist as like about " We
gonna present our thoughts about , because we've just read
the screaming headlines 5 minutes ago .... ":

 
more...
No comment yet.