UK government security arm CESG has published a report of its assessment on the security of all ‘End User Device’ operating systems. Its assessment compared 11 desktop and mobile operating systems across 12 categories including: VPN, disk encryption, and authentication. These criteria are roughly equivalent to a standard set of enterprise security best practices, and [...]
Comments (0)
Sign in to post comments.