From a Mobile Security Article

Just read a mobile security article (http://www.itworld.com/security/298633/5-mobile-security-lessons-department-defense?page=0,2&source=ITWNLE_nlt_today_2012-09-28), it includes somethings like this

“On the one hand, the DoD requires the ability to remotely wipe and disable lost devices, an example of a key centralized management capability. On the other hand, it’s also counting on its extensive user base to understand and implement mobile security policies in the field. As a result, training and human management are central elements of the new strategy.”

Kind of happy to see this type of thinking.