Mobile Device – Where Logical and Physical Come Together Krishna Laudenslager July 1, 2008 Security executives and enterprise officials can use tools to physically protect mobile devices as well as the information contained in them. One example is software-based “black-listing” applications. Just like physicalRead More