Mobile Is Another Endpoint: CIS Critical Security Controls for Mobile

CISOs and CIOs don’t have it easy. I know. Understatement. As technology evolves, both must stay true to the times while maintaining their company’s compliance, security and safety. In 2008, the Center for Internet Security (CIS) was established and published best practice guidelines for computer security, known as the “Critical Security Controls for Effective Cyber … Read More

Zimperium’s Compliance Webinar Series: NERC Compliance for Mobile Devices – The 60% of Endpoints Often Unprotected

NERC Critical Infrastructure Protection (CIP) is designed to secure the assets required for operating North America’s bulk electric system. Since mobile devices from smartphones to tablets are increasingly being used by technicians to service critical infrastructure, it’s vital to ensure organization’s mobile devices are NERC compliant – just as your personal computers and servers are. … Read More

Zimperium’s Compliance Webinar Series: NDB Compliance for Mobile Devices – The 60% of Endpoints Often Unprotected

NDB, part of Australia’s Privacy Act of 1988, introduced an obligation to notify individuals whose personal information is involved in a data breach that is likely to result in serious harm. The legislation applies to all businesses carried on in Australia that collect or hold personal information in Australia. Given the rapid proliferation of mobile … Read More

Zimperium’s Compliance Webinar Series: GDPR Compliance for Mobile Devices – The 60% of Endpoints Often Unprotected

GDPR sets guidelines for the collection and processing of personal information of individuals within the European Union (EU). Given the widespread adoption of mobile devices and applications, including those provided to consumers containing or processing personally identifiable information (PII), it is vital that organization’s mobile devices are GDPR compliant – just as your personal computers … Read More