Data is the New Oil, So How Are We Protecting… Posted on 21 April 2015 by Jason Hart in Enterprise Security Many organisations are sitting on information assets of huge worth — just because they are not making the most of them doesn't change that fact.… Smartphone Security: The Power of Small, Smart… and Safe Posted on 20 June 2012 by Gemalto in Corporate Smartphones are spreading like wildfire, with Australia, the UK, Sweden, Norway, Saudi Arabia and the UAE all boasting smartphone adoption rates above 50% and, according to… From Twitter Loading... More from Twitter Subscribe to updates Select a category of interest: All Categories Enterprise SecurityFinancial ServicesGovernmentIoTMobileSoftware Monetization Enter your email address: Delivered by FeedBurner. Submitting this form will open a popup window to the FeedBurner website. Latest comments 11/01/19 @ 04:01 Eva Looks cool to avoid unexpected payment by thieves with a stolen card. More secure09/01/19 @ 10:01 Kareem Excellent series of blog on the topic. Many thanks.09/01/19 @ 10:01 Kareem Thanks for the explanation. It would be helpful if you cover the idea of a primary and secondary device, where LPA sits exactly in this case and what S/W sits on the primary device.