• Layered Security USING your Mobile Device

    A natural extension to my last post, I find it interesting that most people intuitively see the need to secure mobile devices, applications and transactions, but they are likely unaware of the incredible power and convenience mobile devices present in terms of serving as a security device themselves. Increasingly, mobile devices are used for more and more tasks — the first

        in Fraud, Identity Assurance