Liberation. It’s a powerful word. It’s about freedom from limits on thought or behavior. The reason why I bring this up is because I recently heard from a prospect of mine, here in London, who mentioned he was liberating his employees by giving them the ability to work away from the office. As part of … Read More
Posts in "Mobile Security"
“The good, the bad and the ugly” is a well-known expression, but when it comes to mobile phishing, I suggest shifting the order. Let’s talk about the bad, the ugly and the good. The Bad: Mobile Takes Phishing from Bad to Worse Phishing is one of the most dominant attack techniques in cyber security. Phishing … Read More
Mobile devices contain or have access to the same information as traditional endpoints. While billions of dollars have been spent protecting and securing traditional endpoints, very little has been invested to protect mobile device endpoints. Attackers work on the same model as any other business: where do they get the greatest return on their investment … Read More
These last few days could have CIOs and CISOs very nervous. Two news stories about mobile devices pose real threats for enterprises around the world: From Forbes, “millions of shiny new Android smartphones are being purchased with dangerous malware factory-installed, according to Google’s own security research team.” Also from Forbes, “security firm Check Point has … Read More
This is the second webinar in a two-part series on how two non-profit organizations, the Center for Internet Security (CIS) and MITRE have adapted best practice guidelines to include mobile. The first webinar focused on CIS’ 20 Critical Security Controls. CISOs and CIOs know MITRE ATT&CK is a globally-accessible knowledge base of adversary tactics … Read More