- Your Meta AI prompts might be public - here's how to check
- Paid proxy servers vs free proxies: Is paying for a proxy service worth it?
- Former CISA and NCSC Heads Warn Against Glamorizing Threat Actor Names
- Some apps are battery vampires - how to root them out and shut them down
- How Booking.com measures the impact of GenAI on developer productivity
Risk management and mobile devices

In this episode of The Security Podcasts featuring Jim Coyle, U.S. Public Sector Chief Technology Officer at Lookout, we discuss what organizations can do to manage mobile device risks.
“A lot of the conversations that we have, most people are under the assumption that having a mobile device management — or some kind of management software on their mobile device — will stop all of these various different threats that we see today. Whether it’s phishing, malware or exploitation techniques being utilized against the devices. And unfortunately, it’s just not true.”
Risk management and mobile devices
Jim Coyle, U.S. Public Sector Chief Technology Officer at Lookout, discusses what organizations can do to manage mobile device risks.
Listen to more Security podcasts.
Or check it out on our Apple Podcasts or Spotify channels. Don’t forget to like, follow, and rate and review our podcasts!