While the number of players involved in the delivery of mobile applications and services is large, the ultimate responsibility for security protection rests with the organization that does not want its reputation to be damaged by "whomever" of the players in the mobile value chain -- be it the equipment manufacturer, the network provider, the application vendor, or the end user/employee of the organization.
Advisor
Security in Wireless Devices: Whose Problem Is It?
Posted November 2, 2010 | | Amplify
Don’t have a login?
Make one! It’s free and gives you access to all Cutter research.