Android: A Second Career in Security?

Sometimes it’s a mistake to assume something — or someone — has outlived its usefulness just because it’s already done one thing successfully. For example, many of us have a wealth of decommissioned corporate-provisioned mobile devices: We’ve bought them, handed them out, and seen them used successfully for years. Now they’re on their way to the great docking station in the sky. However, because these devices are already off the books adapting them for specific security functions can mean achieving certain goals practically for free.

Comments are closed.