- Revisiting Docker Hub Policies: Prioritizing Developer Experience | Docker
- The most critical job skill you need to thrive in the AI revolution
- Kickstart 2025 with the Top Five in Cisco U. Essentials
- Google Announces Quantum-Safe Digital Signatures in Cloud KMS
- Apple Breaks Silence on UK Probe, Removes Data Protection Tool From UK Users
Risk management and mobile devices

In this episode of The Security Podcasts featuring Jim Coyle, U.S. Public Sector Chief Technology Officer at Lookout, we discuss what organizations can do to manage mobile device risks.
“A lot of the conversations that we have, most people are under the assumption that having a mobile device management — or some kind of management software on their mobile device — will stop all of these various different threats that we see today. Whether it’s phishing, malware or exploitation techniques being utilized against the devices. And unfortunately, it’s just not true.”
Risk management and mobile devices
Jim Coyle, U.S. Public Sector Chief Technology Officer at Lookout, discusses what organizations can do to manage mobile device risks.
Listen to more Security podcasts.
Or check it out on our Apple Podcasts or Spotify channels. Don’t forget to like, follow, and rate and review our podcasts!