Currently browsing: Mobile Threat Defense

Sideloaded Applications: The Risk of Fewer Restrictions

Would you trust an application on your device from a third-party app store? Would you trust that same app store on the endpoints connected to your corporate infrastructure? The premise of a third-party app store is relatively innocent on the surface, with hundreds of repositories set up to enable mobile […]

Read more

Zimperium and Ping Identity Extend Zero Trust Controls to the Most Vulnerable Endpoint: Mobile

Integration of Zimperium’s mobile device risk attestation into the PingFederate platform enables real-time Zero Trust authorizations and access to corporate resources Zimperium is excited to announce a partnership with Ping Identity, enhancing Zero Trust architectures by delivering comprehensive mobile risk posture data to enable joint customers to implement more robust […]

Read more

Gartner 2021 Market Guide for Mobile Threat Defense

“Security and risk management leaders who need to strengthen their mobile security posture should adopt MTD products to improve their overall security hygiene.” – Gartner Gartner recently published the 2021 Market Guide for Mobile Threat Defense report, and the analyst firm continued to highlight the importance of enterprise adoption of […]

Read more

Zimperium Impresses; Named Top Cybersecurity Startup for 2021

“So, get ready to be really impressed,” Max Kurton of EM360 – a global technology platform – exclaimed as he revealed Zimperium as the number one cybersecurity startup of EM360’s Top 5 Cybersecurity Startups for 2021.  In the article – part of EM360’s Emerge5 series – Max writes, “With new […]

Read more

Apple’s Latest Security Fix Shows Why Enterprises Need MTD

Apple’s high-profile release of iOS 14.4, including security fixes for three critical vulnerabilities said to have been exploited by hackers in the wild, once again shows why enterprises need to deploy mobile threat defense (MTD) solutions.  Whether it is the Jeff Bezos hack or the ‘scariest iPhone hack ever,’ vulnerabilities […]

Read more

CISOs and CIOs: Protecting Traditional Endpoints Isn’t Enough

As government cyber teams feverishly perform damage control from the SolarWinds hack, one major question for CISOs and CIOs cannot be ignored: “Protecting traditional endpoints isn’t enough; how am I going to assess and protect my mobile devices?”   Threat visibility comes from sensors, and if your mobile devices don’t utilize […]

Read more

Dutch MIVD Joins U.S. DoD in Acknowledging Mobile Device Threats

Recently, the Military Intelligence and Security Service division of the Dutch Armed Forces Central Command warned that businesses no longer meet using smartphones or tablets.  According to De Telegraaf (use Google Translate to translate), the highest boss of the Military Intelligence and Security Service (MIVD) advises large companies no longer […]

Read more