Cybersecurity compromises are commonplace in the news, but rarely is it cited the compromise involved a mobile device. Attribution typically falls to vulnerabilities, social engineering, or data left in the open. With no mention of mobile devices, the perception is mobile devices are secure. In other words, there’s no smoke, so there’s no perceived fire … Read More
Posts in "App Security"
The challenge with explaining something new is making that new thing relatable to something someone else already knows and understands. This is why the definition of endpoint security is so often misunderstood or mislabeled. Many compare endpoint security to antivirus protection because it is the easiest way to explain the concept. The truth is antivirus … Read More
Zimperium Selected CIO Applications Europe’s Top 10 Most Proficient Enterprise Mobility Solution Providers of 2019
The editorial team at CIOApplications Europe, along with a distinguished panel of CEOs, CIOs, VCs, and industry analysts, have named Zimperium to its list of the ten most proficient Enterprise Mobility Solution Providers of 2019. The annual list, appearing in the April edition of CIOApplications Europe, highlights those companies that are at the forefront of providing … Read More
Zimperium Webinar Series: Seven Deadly (Mobile Security) Sins… According to CISOs; Second Sin – Not Protecting Corporate Apps
Zimperium is hosting a series of webinars focusing on seven of the problem areas, or deadly sins, chief information security officers (CISOs) must address. In this webinar, the deadly sin of not protecting corporate apps is discussed. WHO: Zimperium, a global leader in enterprise mobile threat defense (MTD) and a leading provider of real-time, on-device … Read More
Zimperium, a global leader in enterprise mobile threat defense (MTD) and a leading provider of real-time, on-device protection against known and unknown mobile threats, hosted a series of webinars focusing on seven of the problem areas, or deadly sins, chief information security officers (CISOs) must address. Most organizations now realize that mobile devices are an unprotected endpoint … Read More