This debate is as old as the smartphone, though this article does update the conversation to include the variables now on the table thanks to some of the openness demonstrated by iOS 8. I will hold my comments for a future post, but I sincerely believe everyone should make a conscious decision as to the security features their smartphone should leverage.
top of page
Recent Posts
See AllI recently spoke about the FTC’s lawsuit against Chegg, a major education tech firm, in one of the weekly tech tips interviews I provide...
Multiple sources have reported the breach of Cisco’s own network, purportedly via a Cisco employee’s personal Google account. According...
I very much enjoyed this article from Pieter Danhieux via Dark Reading and this creative approach to the management of applications and...
bottom of page