Securing in-car automations for company devices: policy, MDM and threat models
A security-first guide to car automations on corporate devices: MDM controls, device separation, egress policy, logging, and threat models.
Car-based automations sound deceptively simple: tap a shortcut in Android Auto, trigger a workflow, and let the device do the rest. For employees, that can mean fewer taps and less distraction; for IT and security teams, it can also mean new attack surfaces, policy ambiguity, and compliance questions that are easy to miss until something goes wrong. The right way to think about this is not “should we allow automations in cars?” but “what classes of automation are safe on managed devices, under what controls, and with what logging and response expectations?” If you already manage phones, tablets, and laptops with an MDM platform, you are halfway there—but road-facing automation changes the risk profile in ways that standard mobile policy templates often overlook.
This guide takes a practical, security-first view of in-car automations on corporate devices. We will cover device separation, MDM enforcement, network egress controls, logging, and realistic threat models for employees using company phones while driving. Along the way, we will connect these ideas to broader device governance patterns discussed in guides like applying procurement discipline to SaaS sprawl, safer experimentation workflows for admins, and guardrails for autonomous agents. The core principle is simple: if a workflow can be triggered while a person is moving, it must be treated like a production system with an edge location, not like a casual convenience feature.
Why in-car automations create a different security problem
Driving changes attention, response time, and verification
In-car use is not just “mobile use with a different background.” The driver’s attention is fragmented, input methods are constrained, and the tolerance for prompt verification drops sharply. That matters because many automation flows rely on quick confirmation, contextual prompts, or “tap to approve” decisions that are reasonable at a desk but unsafe in a vehicle. Even when the intent is benign, voice-triggered or shortcut-triggered workflows can create accidental execution, especially if the device is connected to vehicle systems or a companion interface such as Android Auto. For a corporate device, that means the blast radius includes not only user error but also policy bypass through convenience.
Security teams should also assume that road-facing contexts encourage one-touch interactions that are easier to socially engineer. An attacker who convinces a user to trigger a “navigation update,” “missed call summary,” or “urgent support shortcut” may exploit the reduced scrutiny that comes with driving. This is similar in spirit to how different operational settings alter risk in areas like presence-based home automations or agentic marketing workflows: the automation is not inherently unsafe, but the context changes what normal oversight looks like.
The most common mistake: treating the car as a trusted workspace
Many organizations implicitly assume that if a device is enrolled and encrypted, it is equally safe everywhere. That assumption fails in the car because the environment may be shared, noisy, exposed, and physically insecure. A phone mounted on a dashboard can be observed by passengers, valet staff, mechanics, or a thief during a break-in. Bluetooth pairing, USB connections, and voice assistants can also create persistence or proximity-based trust that lasts beyond the driving session. The policy question, then, is not merely whether the phone is corporate-owned—it is whether the car environment should ever be allowed to become a trusted execution context for sensitive workflows.
A more accurate mental model is to treat the car like a semi-public, transient edge environment with limited trust and high human error potential. That means automations must be rated by the sensitivity of the data they expose, the actions they can take, and the recovery path if they are misfired. If you need a useful analogy, think about how teams evaluate high-risk content or operational triggers in other domains, such as prompt linting rules for dev teams or court-defensible audit logging. In both cases, the system must be designed for scrutiny before it is allowed to act.
Threat model: what can actually go wrong in road-facing automations
Data exfiltration through notifications, summaries, and voice output
The most likely risk is not sophisticated malware; it is unintended disclosure. Vehicle displays, spoken assistant responses, lock-screen notifications, and callouts from automations can expose calendars, contact details, ticket IDs, customer names, project titles, MFA prompts, or internal URLs. If your employees handle regulated or confidential information, even a brief audio readout can be a reportable incident under certain policies or contractual obligations. Data exfiltration in this context often looks mundane: a reminder saying “open the Q4 acquisition folder” or a task automation reading a sensitive title aloud while coworkers are in the car.
To reduce this risk, classify every road-triggered automation by data sensitivity and output channel. A navigation alert is usually fine; a workflow that reads task content, incident notes, or customer records aloud is not. This is why teams that manage broader device fleets often adopt concepts similar to those in data residency and DR planning or provenance metadata: you need to know where data can surface and who can observe it, even if the workflow itself is legitimate.
Unauthorized task execution through voice or proximity abuse
Automations that can create tickets, approve requests, send messages, or trigger administrative actions become risky if a voice assistant or paired interface can be manipulated by someone other than the owner. An attacker in the physical vicinity may try shoulder-surfing, voice injection, or Bluetooth pairing abuse. A more realistic concern is not a full device takeover but a “low-friction action forgery,” where the user never intended to approve the action but the automation fired because the environment was noisy, the prompt was ambiguous, or the car interface simplified the workflow too much. This is especially relevant when the shortcut has downstream effects in systems of record like ITSM, CRM, or incident response tools.
Organizations should assume that any automation capable of writing to business systems needs stronger intent verification than an ordinary reminder or media action. That means high-risk actions should require a second-factor approval that is not easy to satisfy in the vehicle, such as a re-authentication step after the driver is parked. If that sounds similar to how finance, custody, and public-cloud admins treat sensitive operations, that is because the same principle applies. For more on how to add friction where it matters, compare the thinking behind cycle-aware custodial rules and passkey-based account protection.
Device theft, wireless pairing abuse, and local persistence
If a corporate phone is stolen from a vehicle, the attacker may gain more than stored data. They may inherit trusted Bluetooth pairings, cached assistant sessions, vehicle-specific permissions, or saved automation triggers. In practice, this creates a “local persistence” problem: even if the device is encrypted, prior trust relationships can create secondary exposure once the device is powered on or unlocked. This is why device separation matters. A phone used for driving automations should not also be the repository for especially sensitive work functions if your risk posture is conservative.
Think of the phone and car like an access boundary. If the car can trigger business actions through a voice assistant or shortcut, then the vehicle environment inherits some of the device’s trust. That is no different, conceptually, from how shared endpoint trust is treated in other sectors, including corporate refurbished device evaluation or automotive SaaS reliability planning. The point is to anticipate the path of least resistance for an attacker, not merely the most dramatic scenario.
Policy framework: what corporate devices should and should not do in cars
Classify automations into low, medium, and high-risk tiers
The cleanest policy model is to classify car-based automations by impact, not by app. Low-risk automations include navigation, media, calendar readouts with redaction, and non-sensitive reminders. Medium-risk automations may include workday status updates, simple task creation without content, or approved incident lookups after unlocking. High-risk automations include any action that touches financial data, HR records, privileged admin functions, customer secrets, security incidents, or mass communication. Once you define tiers, the MDM policy can apply different controls to each.
A useful rule of thumb is this: if the automation can disclose regulated data, alter a business record, or trigger external communication, it is not “drive-safe by default.” It must be treated like a privileged operation. For teams already standardizing workflows, the same mentality used in competency certification and linting rules applies here too: define what is allowed, enforce it consistently, and make exceptions explicit rather than accidental.
Adopt a device separation policy for corporate-owned and BYOD scenarios
Device separation is one of the most effective controls because it limits the overlap between personal convenience and enterprise risk. For corporate-owned mobile devices, consider creating a dedicated “driving profile” or a constrained set of allowed automations, with no access to privileged apps, enterprise chat, or sensitive document repositories. For BYOD, the bar should be higher: if the device is used for both personal driving automation and corporate access, only the lowest-risk shortcuts should be permitted, and only within a tightly managed work profile. In some environments, the right answer is to prohibit in-car automations on BYOD entirely and reserve them for corp-owned devices with full MDM visibility.
This separation also reduces the chance that personal app permissions bleed into business workflows. The more apps can observe notifications, contacts, microphone input, or location events, the harder it becomes to reason about exfiltration. A strong separation policy is analogous to how teams control scope in other operational playbooks, such as SaaS sprawl governance or capacity planning. The more shared the system, the more carefully you must manage trust boundaries.
Require explicit approval for sensitive actions outside a trusted location
A practical policy is to permit only read-only or low-impact automations while the device is in a moving or vehicle-associated context. Anything that writes data, sends messages, opens privileged views, or changes access should require a trusted location or a parked-state confirmation. If your automation platform supports context checks, you can use geofencing, motion-state signals, or a parked-vehicle condition to delay high-risk actions until the user is stationary. That is a sensible compromise between productivity and safety because it prevents “instant action” when the user is least able to review the result.
Policies should also be written in language employees can understand. “No automation may disclose customer names aloud in a moving vehicle” is much clearer than “minimize data exposure during transit.” For organizations with compliance obligations, this kind of specificity mirrors the clarity needed in audit-ready logging systems and provenance controls. Ambiguity is the enemy of enforceability.
MDM controls that make road automations safer
Use MDM to constrain app capabilities, not just app installation
Most MDM programs focus on which apps can be installed, but road automation safety depends more on what those apps can do. Use MDM to disable or restrict notification previews, control voice assistant integration, limit background access to business data, and narrow which apps can appear in automotive interfaces. If your platform supports per-app VPN, certificate-based trust, or managed configuration, apply those settings to automation-capable apps so that only approved services can be reached. The goal is not merely to “allow Android Auto” but to define exactly which data flows are acceptable when the device is in motion.
Where possible, separate work and personal containers so enterprise app content never appears in a consumer-facing assistant context. That includes calendars, task managers, notes apps, and chat tools. This level of control resembles the discipline used in health data residency designs, where the question is not whether data exists but where it is permitted to flow. In mobile security, the automation layer is a new policy boundary that deserves the same rigor.
Lock down Bluetooth, USB, and assistant permissions
Bluetooth and USB are ordinary convenience features, but they can widen the trust boundary significantly. MDM should allow only approved pairing workflows, prevent auto-connection to unknown devices, and revoke trust on device wipe or reassignment. Assistant permissions should also be minimized: if an app or assistant has the ability to read work notifications, execute shortcuts, or access enterprise calendars, that privilege should be deliberately granted and periodically reviewed. A common failure pattern is leaving permissions broad “just in case,” which becomes a long-term exfiltration path.
Use the same mindset you would apply to connected hardware in other contexts. If a user can pair one device to another and inherit trust, you should assume that trust can be replayed later by an attacker with physical access. For product teams that think in terms of dependencies, this is like evaluating upstream and downstream impacts in automotive supply shocks or promotional offer controls: small defaults can create outsized consequences.
Enforce conditional access and posture checks for sensitive services
If an automation touches a sensitive SaaS app or internal API, pair MDM with conditional access so the action only succeeds when the device posture is healthy and the session is recent. This can include device compliance, OS version, encryption status, jailbreak/root detection, and certificate validity. Conditional access should also reduce the chance that a lost or compromised phone remains a viable trigger for business workflows. In high-risk environments, time-bound tokens and re-authentication windows are more important than convenience.
That approach aligns with modern guardrails for semi-autonomous systems. If a workflow is allowed to act, it should still be constrained by policy, just as autonomous marketing agents need KPIs and fallbacks. On company devices, the “fallback” is often a denied action plus an audit event—not a silent success.
Network egress: treat the car like a constrained untrusted network
Default-deny outbound connections for automation services
Network egress policy is one of the most underused controls for mobile security. If the device is in a driving context, automation-capable services should be allowed to reach only the minimum set of domains, APIs, and identity providers required for that workflow. Default-deny is particularly important when assistants or shortcuts can chain together multiple actions, because each additional destination broadens the attack surface. If your automation app can phone home to arbitrary endpoints, the car becomes a convenient exfiltration channel rather than a controlled workspace.
For enterprises with stronger requirements, route managed device traffic through secure egress with logging, DNS filtering, and SASE controls. This allows you to detect odd destinations, repeated failures, or data-heavy responses from automation endpoints. The strategy resembles how operators handle high-volume infrastructure risk in cloud capacity planning: when the environment changes, keep visibility on the pipes, not just the endpoint.
Limit telemetry, analytics, and third-party SDK leakage
Many mobile apps quietly send analytics, crash reports, usage fingerprints, and assistant interaction data to third parties. In a car-based context, those logs can reveal location, timing, voice command content, and behavioral patterns that are more sensitive than the underlying business action. MDM and mobile application management should therefore vet automation-capable apps for SDK leakage and telemetry settings, and security reviews should ask whether the app sends command metadata off-device. If the answer is “we’re not sure,” you already have a risk problem.
This is where compliance and privacy intersect. A “harmless” shortcut may become a data governance issue if it emits identifiers, route data, or task descriptions to vendors outside your approved list. The same thinking applies in other domains where metadata matters, such as capture-time provenance or audit-grade consent logs. Know what leaves the device, where it goes, and whether it is necessary.
Use private DNS, per-app VPN, and certificate pinning where appropriate
Private DNS and per-app VPN can reduce the chance of traffic being hijacked or redirected through untrusted networks while the device is on the road. Certificate pinning may be appropriate for the most sensitive in-house automation services, though it should be deployed carefully to avoid operational fragility. The goal is to ensure that road-triggered actions don’t depend on insecure public paths or opportunistic captive portals. This is particularly important for employees who drive through airports, hotels, or public Wi-Fi environments during travel.
In practical terms, your policy should say that automations must fail closed if they cannot verify the endpoint securely. A failed automation is annoying; an exfiltrated or misdirected one is much worse. For organizations already using managed network profiles, this same mentality appears in resources like hybrid cloud data controls and policy linting, where secure defaults matter more than clever exceptions.
Logging, detection, and auditability
Log intent, execution, and downstream effects separately
Good logs should capture at least three events: what the user intended, what the automation actually executed, and what downstream system changed as a result. This separation matters because in-car environments are prone to partial failures, duplicate triggers, and misheard commands. If a task was created, a message sent, or a record updated, you need to know whether the cause was a voice command, a shortcut tap, or an automatic chain. Without that traceability, post-incident analysis becomes guesswork.
Security and compliance teams should also define retention periods and access controls for these logs. Logs that include command text or sensitive titles can themselves become a data exposure risk, so they should be protected as carefully as the source systems. This is where the discipline seen in defensible dashboards and provenance-rich capture systems becomes relevant: you want enough detail to reconstruct events without turning logs into a second copy of sensitive data.
Create alerts for unusual routing, frequency, and location patterns
Detection should not focus only on account compromise. It should also flag odd patterns such as repeated automation execution while the device is moving, a surge in denied actions, commands issued from unusual geographies, or a shortcut that suddenly begins contacting new endpoints. Those patterns can indicate misuse, policy drift, or compromise. For road-facing use, the quickest wins often come from behavior-based alerts rather than advanced malware signatures.
For example, if a user normally triggers a navigation shortcut once a day and suddenly starts initiating multiple privileged workflows from a roadside rest stop, that deserves review. Likewise, if an automation begins failing because a certificate changed or a VPN route broke, that may be an operational issue—or it may be an attacker probing the environment. A good comparison is the way teams monitor anomalies in on-chain flow analysis or data-first audience analytics: the signal is in the change, not just the absolute value.
Make user-visible logs and self-service review available where safe
Employees are more likely to trust and comply with policy when they can see what was logged and why. Provide a user-facing history of automation runs, especially for actions that were blocked or delayed due to policy. That history should be concise, readable, and clear about what data was accessed. A self-service review path also reduces support tickets because users can distinguish a policy denial from a technical outage.
If you want adoption without chaos, transparency matters. This mirrors other areas where clarity improves behavior, such as audience trust-building or change communication. People are more likely to follow rules they can understand and verify.
Building a realistic approval model for corporate road automations
What should be allowed by default
By default, allow only low-risk, read-light, and non-sensitive automations. Examples include opening approved navigation, reading non-sensitive calendar titles after redaction, starting media playback, or capturing a reminder to review after parking. Anything that can reveal internal names, customer details, credentials, or incident data should be denied or heavily constrained. That default stance prevents the automation layer from becoming a shadow productivity channel with weak oversight.
Default allowance also needs time limits. A shortcut that is safe in the morning may not be safe at 7 p.m. if it starts reading off a private calendar. The policy should therefore bind both content class and context. When teams evaluate convenience features like this, they should apply the same rigor used in structured product comparison or decision frameworks before purchase: what works under one condition may be the wrong choice under another.
What should require explicit approval or re-authentication
Require explicit approval for messaging, access changes, ticket updates with sensitive content, file retrieval, customer communications, and any workflow that could have contractual or legal effects. In practice, that often means the automation can queue the action in the car but cannot execute it until the user is parked and re-authenticated. This keeps the convenience of capturing intent without the hazard of immediate execution in an unsafe setting. It also makes incident response easier because the system can show a clear approval boundary.
For higher-risk departments such as security operations, finance, or HR, consider banning execution altogether from vehicle contexts. A queued draft is acceptable; a direct production change may not be. This is similar to how teams distinguish between review and publish in other systems, including autonomous agent controls and certified operational roles.
How to document exceptions without creating policy debt
Exceptional use cases will arise, especially in field operations, incident response, and executive support. When they do, use a documented exception process with an end date, owner, and compensating controls. Exceptions should include the specific automations allowed, the data classes permitted, and the logging or alerting required. Avoid informal one-off approvals that linger forever because they are impossible to inventory later.
If your organization has already struggled with ad hoc software approvals or configuration drift, this is the same problem in a new costume. Good exception management is a form of lifecycle control, much like the discipline needed to avoid sprawl in subscription governance or to manage controlled experimentation in admin testing workflows. Temporary should mean temporary.
Comparison table: policy options for in-car automations
| Policy option | Security posture | User experience | Best fit | Main risk |
|---|---|---|---|---|
| Allow all shortcuts on managed phones | Weak | Very convenient | Low-risk personal use | Data leakage and unauthorized actions |
| Allow only read-only automations | Moderate | Convenient | General corporate fleets | Sensitive data can still be exposed verbally |
| Require parked-state confirmation for writes | Strong | Moderate friction | Most enterprise environments | User frustration if re-auth flow is poor |
| Separate driving profile on corp-owned devices | Strong | Good balance | Managed fleets with MDM maturity | Profile complexity and support burden |
| Ban road-triggered business actions for BYOD | Very strong | Low convenience | Regulated or high-risk teams | Shadow IT if employees seek workarounds |
Implementation checklist for security, IT, and compliance teams
Policy and governance checklist
Start by defining which automations are allowed in motion, which are allowed only when parked, and which are banned outright. Write the policy in plain language and map it to data classification tiers so users and managers can understand why a shortcut is blocked. Then identify owners for approvals, exceptions, and periodic review. If you already maintain inventory for applications and endpoints, add automation flows to that inventory so they are visible in audits and risk reviews.
Next, document the approved vehicle contexts. Is the policy tied to Android Auto specifically, to any audio-first interface, or to any automation invoked while the device is in motion? Those distinctions matter because the control should follow the risk, not the brand. The same inventory discipline shows up in other operational planning guides such as capacity management and software sprawl reduction.
MDM and endpoint checklist
Use MDM to control notification previews, assistant permissions, managed app configuration, Bluetooth pairing rules, and corporate profile separation. Restrict sensitive apps from appearing in car interfaces, and enforce app allowlists where possible. Require device compliance, encryption, and current OS patch levels before automation services can execute. If your environment supports it, route corporate automation traffic through approved egress and deny unknown destinations by default.
On the endpoint side, test what happens when the device is lost, locked, offline, or in low-signal areas. The safe failure mode should be “automation cannot execute” rather than “automation falls back to insecure behavior.” When the plan is strong, users can still remain productive without opening hidden channels for exfiltration. This is the same reliability principle that underpins thoughtful systems design across domains, from automotive SaaS resilience to data residency architectures.
Logging, training, and incident response checklist
Make sure logs capture the intent, trigger source, device identity, timestamps, endpoint destinations, and downstream changes. Train users on what they may and may not do while driving, and give them examples, not just policy statements. Then rehearse incident scenarios: lost phone in a parking lot, voice-triggered sensitive disclosure, automation accidentally sending customer information, or a compromised pairing trust relationship. The point is to know how you will detect, contain, and review the event before it happens.
If you need a practical rule for managers, use this: if the automation would make you nervous to trigger while distracted in a moving vehicle, it probably belongs behind more friction. That intuition is not anti-productivity; it is what preserves trust so the automation program can scale safely. Operationally mature teams already use similar approaches in linted workflows, auditable dashboards, and guardrailed automation systems.
Practical examples: what good and bad look like
Good example: navigation and status capture only
A sales engineer’s managed phone is allowed to launch navigation, read a redacted reminder list, and capture a queued note that is reviewed later in the office. No customer names are spoken aloud, no internal systems are modified, and no files are opened in the car. The MDM profile blocks work chat previews and prevents enterprise data from appearing on the vehicle display. Logs show the shortcut name, timestamp, and whether the note was queued or denied.
This setup gives the employee speed without handing the car broad trust. It is the right model for most general-purpose corporate fleets because it captures value where risk is low. Think of it as the mobile equivalent of the “safe defaults” mindset seen in passkey adoption or structured product comparisons.
Bad example: voice-triggered ticket updates with sensitive payloads
In the bad case, a technician asks the assistant to “update the incident with the customer’s environment details,” and the device reads the note content aloud while a passenger is present. The workflow also posts to a third-party service over unrestricted egress, leaving a telemetry trail that includes the incident title. If the device is later stolen, a cached assistant session and preserved pairing trust make reconstruction easier for the attacker. This is the kind of compound failure that turns convenience into an incident.
The lesson is not that automations are bad; it is that unbounded automations create a stack of small exposures. Those exposures become serious when combined. A single shortcut is rarely the problem—policy gaps, weak MDM controls, and unmonitored network paths are.
FAQ
Should we allow Android Auto automations on corporate devices at all?
Yes, but only after classifying the use case and limiting it to low-risk workflows by default. Android Auto can be appropriate for navigation, reminders, and other read-light actions, but it should not become a channel for sensitive data disclosure or privileged business changes. If your compliance posture is strict, permit only a narrow allowlist and require parked-state confirmation for anything more than basic convenience.
What is the biggest threat model for road-based automations?
The most likely threat is accidental or unintended disclosure, not advanced remote compromise. Voice readouts, notification previews, cached assistant responses, and overly broad app permissions can leak sensitive business information in ordinary driving situations. Secondary risks include unauthorized action execution, Bluetooth trust abuse, and data exposure after device theft.
How should MDM be used here?
MDM should do more than enforce enrollment and encryption. Use it to control notification previews, assistant permissions, work/personal separation, Bluetooth pairing rules, app allowlists, and conditional access to sensitive services. In mature environments, MDM should also support network egress controls and logging hooks so automations are observable.
Do we need separate policies for BYOD and corporate-owned devices?
Absolutely. Corporate-owned devices can support stronger controls and more nuanced profiles, while BYOD should usually be restricted to the lowest-risk automations or prohibited from road-triggered business actions entirely. The overlap between personal convenience and enterprise access is much harder to secure on BYOD, especially when voice assistants and car displays are involved.
What should we log for compliance?
At minimum, log the automation trigger, user identity, device identity, timestamps, target service, execution result, and any downstream business change. If command text or response content may be sensitive, protect those logs with the same rigor as the source systems. Also define retention, review access, and alerting thresholds so logs are useful without becoming a privacy liability.
Can we just block all car-based automations to be safe?
You can, but that may push employees toward shadow workarounds and reduce adoption of legitimate productivity tools. A better approach is usually a risk-based policy: allow low-risk automations, constrain medium-risk ones, and ban high-risk actions in motion. That gives you practical security without forcing users to abandon the workflow entirely.
Conclusion: secure convenience by designing for the road, not the desk
Car-based automations can absolutely be part of a modern corporate mobility strategy, but only when the policy treats them as a special-risk context. The right control stack is layered: device separation to reduce trust overlap, MDM to constrain capabilities, network policies to limit egress, logging to preserve accountability, and threat models that reflect how people actually behave while driving. If you get those layers right, employees can benefit from faster workflows without exposing the enterprise to avoidable data exfiltration or unauthorized actions. If you get them wrong, even a tiny shortcut can become a surprisingly durable security problem.
For organizations building a broader governance program, the lesson extends beyond vehicles. Any automation that interacts with sensitive systems should be scoped, audited, and deliberately bounded, whether it runs on a desktop, phone, or in-car interface. That is the same operating logic behind guardrailed agents, policy linting, and court-ready auditability. Convenience is only sustainable when security is designed in from the start.
Related Reading
- Securing Google Ads Accounts with Passkeys: A Marketer’s Implementation Guide - Useful for understanding strong authentication patterns on managed accounts.
- Practical Guardrails for Autonomous Marketing Agents: KPIs, Fallbacks, and Attribution - A helpful model for setting boundaries around semi-autonomous workflows.
- Designing an Advocacy Dashboard That Stands Up in Court: Metrics, Audit Trails, and Consent Logs - Strong reference for log design and compliance-grade accountability.
- Architecting Hybrid & Multi‑Cloud EHR Platforms: Data Residency, DR and Terraform Patterns - Relevant for thinking about data residency and controlled data movement.
- Prompt Linting Rules Every Dev Team Should Enforce - A good companion for writing clear policy guardrails for automations.
Related Topics
Jordan Avery
Senior SEO Content Strategist
Senior editor and content strategist. Writing about technology, design, and the future of digital media. Follow along for deep dives into the industry's moving parts.
Up Next
More stories handpicked for you