This is a follow up on a couple of recent items we’ve had here lately, about security not only in an age of mobile technology, but security in an age where information between devices can be transferred with a literal “touch,” or “bump.”
This is a follow up on a couple of recent items we’ve had here lately, about security not only in an age of mobile technology, but security in an age where information between devices can be transferred with a literal “touch,” or “bump.”