The increasing reliance on mobile devices and applications is driving the need for mobile certificates to ensure that devices and applications are secure, authenticated, and encrypted for enterprise users. But failing to protect mobile certificates—to whom they are issued and when they need to be revoked—opens the door to unauthorized access, data leakage, and intellectual property theft. The fact is that keys and certificates of all kinds, including mobile certificates, are being targeted to initiate and continue attacks every single day.
However, research published by Forrester Research uncovers that IT security professionals are not fully aware of the implications of what is required to protect mobile certificates. This creates gaps in understanding how to perform the most critical functions necessary for securing mobile certificates.
more here.............https://www.venafi.com/blog/post/forrester-research-uncovers-gaps-in-mobile-certificate-security
However, research published by Forrester Research uncovers that IT security professionals are not fully aware of the implications of what is required to protect mobile certificates. This creates gaps in understanding how to perform the most critical functions necessary for securing mobile certificates.
more here.............https://www.venafi.com/blog/post/forrester-research-uncovers-gaps-in-mobile-certificate-security