These last few days could have CIOs and CISOs very nervous. Two news stories about mobile devices pose real threats for enterprises around the world: From Forbes, “millions of shiny new Android smartphones are being purchased with dangerous malware factory-installed, according to Google’s own security research team.” Also from Forbes, “security firm Check Point has … Read More
Posts in "Mobile Threat Defense"
This is the second webinar in a two-part series on how two non-profit organizations, the Center for Internet Security (CIS) and MITRE have adapted best practice guidelines to include mobile. The first webinar focused on CIS’ 20 Critical Security Controls. CISOs and CIOs know MITRE ATT&CK is a globally-accessible knowledge base of adversary tactics … Read More
CISOs and CIOs don’t have it easy. I know. Understatement. As technology evolves, both must stay true to the times while maintaining their company’s compliance, security and safety. In 2008, the Center for Internet Security (CIS) was established and published best practice guidelines for computer security, known as the “Critical Security Controls for Effective Cyber … Read More
According to Threatpost, another new malicious Android app – dubbed “Monokle”- is gaining attention. While Monokle has some interesting capabilities (e.g., making extensive use of Android accessibility services to exfiltrate data and predictive-text dictionaries to understand a target’s interests), it is still basically another malicious app. Monokle is a highly-targeted malicious app (Monokle has been … Read More
As the worldwide leader in mobile threat defense (MTD), no company protects more enterprise mobile devices than Zimperium. As a result, we have incredibly rich and unmatched forensic data about mobile device, network, phishing and app risks and attacks from all around the world. Based on popular demand, Zimperium held a free webinar on July … Read More