UA

January 15, 2013

NETWORKING

One Policy for the BYOD Challenge

2 min read

Several years ago, I had a conversation with an IT manager about his company’s network security that I still remember today. He said: “We’re losing our battle over internal network security. We cannot keep up with our vendors and contractors who bring in all kinds of devices to our network. We may turn our internal […]