Zimperium Announces Mobile Threat Defense for BYOD users with Microsoft Intune

Today, Microsoft announced an exciting new capability providing additional benefits to users of apps protected by Microsoft Intune app protection policies. You can read the official announcement here. Zimperium device risk-based evaluation is now integrated with Microsoft Intune for protected apps on non-enrolled devices to add another layer of protection for corporate data in bring-your-own-device … Read More

Top Three Mobile Phishing Lures: #3) SMS & Messaging Apps

According to Verizon’s Mobile Security Index 2019, “85% of phishing attacks seen on mobile devices take place outside of email. While many organizations have filtering in place to block email-based attacks, far fewer have similar protection in place for these other routes.”  Furthermore, the Federal Trade Commission reported 93,000 complaints about unwanted texts in 2018, … Read More

Malicious Websites Put iOS Devices At Risk

In an excellent and deep blog analysis, Ian Beer of Google’s Project Zero outlines five separate iOS exploit chains that were found on a small collection of hacked websites. The hacked sites were being used in indiscriminate watering hole attacks against their visitors, using iOS 0-day. (For another watering hole attack example, please see our … Read More

5 Must-Have Sections For Every Enterprise Mobile Security RFP – Must-Have #5: Deployment Technology & Workflow Integrations

Our final webinar in our series of “The 5 Must-Have Sections for Every Enterprise Mobile Security Request For Proposal (RFP)” reviews Deployment Technology & Workflow Integrations, and took place on July 24, 2019. JT Keating, Vice President of Product Strategy and someone who has responded to literally hundreds of RFPs, led the session. Different enterprises utilize different deployment … Read More