-
Lisa Phifer owns Core Competence Inc., a consulting firm specializing in business use of emerging Internet technologies. Lisa has been involved in the design, implementation and evaluation of internetworking, security and management products for 30 years. At Core Competence, she has advised large and small companies regarding security needs, product assessment and the use of emerging technologies and best practices. She teaches about wireless LAN and mobile device administration and security, and has written extensively for numerous publications, including Information Security, SearchSecurity, SearchMobileComputing, TomsITPro, and Wi-Fi Planet. Phifer's insight columns and technical tips are published monthly by SearchNetworking and the AirWISE Community Security Center. She holds an MS, Computer Science from Villanova University, and a BS in Computer Science from West Chester University.
-
Do you have a question for our experts?
-
- Website:
- http://www.corecom.com/index.html
- Follow:
Contributions from Lisa Phifer, Contributor
- BYOD security strategies: Balancing BYOD risks, rewards
- How to implement and supplement remote wipe for BYOD
- MDM features vs. native mobile security
- Mobile device management helps IT regain control
- Exploring Android security settings and device controls
- Writing a mobile device security policy that works
- Securing Android devices with a mobile security policy
- Top 5 mobile data protection best practices
- Quiz: Preventing data theft on mobile devices
- Enforcing endpoint security
- Portable USB thumb drive encryption: Software and secur
- Removable storage device endpoint security and control
- Securing your wireless network: Preventing wireless sec
- How to keep networks secure when deploying an 802.11n u
- Hunting for rogue wireless devices
- An introduction to wireless security
- Wireless Security Lunchtime Learning
- A wireless network vulnerability assessment checklist
- A list of wireless network attacks
- Smartphone security: The growing threat of mobile malwa
Security Management Strategies for the CIO