Abstract :
Securing corporate information is like squeezing the air in a balloon: the more you tighten your grip on it in one place the more likely it is to escape to another. Now some of the techniques that have been developed to protect mobile data on laptops are being extended to do the same for smartphones, and to start making inroads into what may be the last unprotected source of mobile corporate data- the voice.