BYOD Security challenges: control and protect your most sensitive data Publication Type: Journal Article Authors: Bill Morrow Source: Network Security, Volume 12, p.5-8 (2012)