How to use threat intel to boost mobile security

Integrating threat intelligence feeds with mobile device management platforms can shore up BYOD security

Become An Insider

Sign up now and get FREE access to hundreds of Insider articles, guides, reviews, interviews, blogs, and other premium content. Learn more.

Security pros are recommending that companies integrate threat intelligence -- the real-time sharing of intelligence information about cyber security threats and malicious applications -- with mobile device management platforms in order to improve mobile security.

The first step, according to Larry Whiteside, Jr., chief security officer of the Lower Colorado River Authority, is to make sure you're getting the same level of log information from your enterprise mobility management (EMM)/mobile device management (MDM) provider as you would from your desktop security provider.

To continue reading this article register now

Notice to our Readers
We're now using social media to take your comments and feedback. Learn more about this here.