Resources

Twitter Hack Highlights the Realities of Mobile Phishing

** Update ** According to multiple reports, including Bloomberg (August 1) – “The alleged mastermind behind the July 15 hack of Twitter accounts of business titans, celebrities and a former president didn’t need sophisticated hacking tools to pierce the company’s security system. Rather, he convinced an information technology employee at […]

Read more

Mobile Endpoint Security | The Importance of Mobile Security

Underestimating the Importance of Mobile Security Suppose one of your business’s employees was out and about one day and her mobile device got hacked. The general consensus would be it’s not exactly a disaster. It’s unlikely that you store your enterprise’s intellectual property on a given employee’s smartphone.  It’s not […]

Read more

Mobile App Security vs. Web App Security | How They Differ

Mobile Apps Are Different Than Web Apps; Mobile and Web App Security Must Be Different Too From a security perspective, almost every company invests in technology to protect their organization’s network, resources, websites and data. Even given the fast-expanding attack surface that mobile, IoT and other technologies are driving, many […]

Read more

Get started with Zimperium today