That tiny chip buried deep in smartphones, which requires a pin-like device to remove, might seem securely locked away. But the lack of physical access to SIM cards doesn’t make them immune…


THE BUSINESS OF TECHNOLOGY
That tiny chip buried deep in smartphones, which requires a pin-like device to remove, might seem securely locked away. But the lack of physical access to SIM cards doesn’t make them immune…
Keeping corporate data safe is a constant challenge for many security professionals. Deploying the most rigorous security stack–including firewalls, intrusion prevention systems, network monitors, data encryption, two factor authentication, anti-virus software and…