Learn why OWASP publishes a separate OWASP Mobile Top 10 list to address mobile’s fundamentally different characteristics, architectures, & threat vectors.
Read moreLearn why OWASP publishes a separate OWASP Mobile Top 10 list to address mobile’s fundamentally different characteristics, architectures, & threat vectors.
Read moreAs Apple prepares to open iOS to third-party app stores, learn how developers can ensure their apps meet Apple’s stringent security & privacy standards.
Read moreZimperium is excited to announce the appointment of Grant Goodes as our Innovation Architect. With a decade and a half of experience in application and mobile security, Goodes brings invaluable expertise to continue advancing Zimperium’s market-leading mobile security platform that organizations across the globe use to secure their mobile apps and endpoints. Learn more.
Read moreThe Hacker News recently published a story that discussed a joint communication among the German intelligence apparatus, the Federal Office for the Protection of the Constitution (BfV), and South Korea’s National Intelligence Service (NIS), warning readers about new tactics used by a North Korean threat actor called Kimsuky. Learn more about Kimsuky and how Zimperium Mobile Threat Defense (MTD) customers are protected against these threats.
Read moreConnected medical devices are in high demand, and their usage continues to grow. While these provide tremendous value, they also create a new attack surface that is susceptible to vulnerabilities and exploits. Find out how Zimperium’s Mobile Application Security Suite (MAPS) helps medical device companies build secure, FDA-compliant mobile applications.
Read moreA large amount of sensitive data is shared online during tax season, making it extremely vulnerable to exploitation by malicious actors. Additionally, the growing popularity of tax filing via mobile applications has created many new vulnerabilities. Find out how Zimperium can help protect your mobile tax application, employees, and residents filing their taxes from cybercrime during this tax season.
Read moreIn recent weeks, more news has come out about vulnerabilities affecting Apple devices. In the following article, we present some details about these findings and some important lessons we can learn from them.
Read moreIn recent months, Activision, the maker of Call of Duty, has been the victim of several malicious attacks. Read on to hear the lessons learned from the these attacks and how Zimperium can help.
Read moreThe NCCoE has released the “Implementing a Zero Trust Architecture” that outlines how teams can employ commercially available technology to establish zero trust implementations that are interoperable and standards-based. Zimperium was selected by the NCCoE to work on this project. We’re honored to be collaborating with the NCCoE and other technology providers to help advance the knowledge and guidance available in this critical area.
Read moreTake a look at the emerging threats and uncover the shortcomings of enterprise detection and response (EDR) solutions in addressing these threats. Read on to learn why mobile threat defense (MTD) solutions represent a critical requirement for today’s enterprises.
Read more