CISOs and CIOs don’t have it easy. I know. Understatement. As technology evolves, both must stay true to the times while maintaining their company’s compliance, security and safety. In 2008, the Center for Internet Security (CIS) was established and published best practice guidelines for computer security, known as the “Critical Security Controls for Effective Cyber … Read More
As the worldwide leader in mobile threat defense (MTD), no company protects more enterprise mobile devices than Zimperium. As a result, we have incredibly rich and unmatched forensic data about mobile device, network, phishing and app risks and attacks from all around the world. Based on popular demand, Zimperium held a free webinar on July … Read More
NERC Critical Infrastructure Protection (CIP) is designed to secure the assets required for operating North America’s bulk electric system. Since mobile devices from smartphones to tablets are increasingly being used by technicians to service critical infrastructure, it’s vital to ensure organization’s mobile devices are NERC compliant – just as your personal computers and servers are. … Read More
NDB, part of Australia’s Privacy Act of 1988, introduced an obligation to notify individuals whose personal information is involved in a data breach that is likely to result in serious harm. The legislation applies to all businesses carried on in Australia that collect or hold personal information in Australia. Given the rapid proliferation of mobile … Read More
GDPR sets guidelines for the collection and processing of personal information of individuals within the European Union (EU). Given the widespread adoption of mobile devices and applications, including those provided to consumers containing or processing personally identifiable information (PII), it is vital that organization’s mobile devices are GDPR compliant – just as your personal computers … Read More