mobile security | GovernmentCIO Media & Research

mobile security

Mobile threat detection and other capabilities are protecting data and enhancing the user experience at ICE.
Best practices include multi-factor authentication and a 'least-privileged' model of managing mobile functions and protecting data.
Vulnerabilities lead to questions about home networks and "bring-your-own-device" policies.
The Senate Commerce Committee seeks to balances data collection and use with privacy to control the coronavirus spread.
One month on, mobile device security and video-teleconferencing platforms enter the spotlight.