First published on CloudBlogs on Feb 21, 2017
In the second part of my conversation with
) we talk about time-traveling humpback whales, how an organization as big as his uses mobile and cloud-based security, and we play an intense game of “
IT Would You Rather
Andrew also shares some very helpful advice about how to look at mobile security as a function of the device + app + data + the user. This multi-part and multi-layer approach to security is really valuable and worth considering – so, please, don’t get thrown off by the whales.
He also has more feedback about my driving.