Hear from Zimperium’s very own, Georgia Weidman, on her journey throughout the mobile security industry and how she is proud to join Zimperium in its mission to securing mobile endpoints and applications worldwide.
Hear from Zimperium’s very own, Georgia Weidman, on her journey throughout the mobile security industry and how she is proud to join Zimperium in its mission to securing mobile endpoints and applications worldwide.
Learn all about the NIS2 and how the EU Parliament’s updated NIS directive applies to mobile devices.
The Hacker News recently published a story that discussed a joint communication among the German intelligence apparatus, the Federal Office for the Protection of the Constitution (BfV), and South Korea’s National Intelligence Service (NIS), warning readers about new tactics used by a North Korean threat actor called Kimsuky. Learn more about Kimsuky and how Zimperium Mobile Threat Defense (MTD) customers are protected against these threats.
Today, organizations need to mitigate threats arising from risky applications. While all third-party apps may not be malicious, they can lead to data loss and leakage. Learn how Zimperium MTD can help organizations identify which mobile devices have risky or banned apps and enable organizations to identify, block, and enforce policies to reduce the harm from risky apps to their business. Read more.
Zimperium is excited to announce that we have been named a Gold winner of three 2023 Cybersecurity Excellence Awards in the following categories: Mobile Application Security, Mobile Security, and Mobile Threat Defense. Learn more about these recognitions.
In recent independent testing from AV-TEST, Zimperium’s mobile threat defense solution, zIPS, delivered top-tier results—better than 99% accuracy in about all scenarios. Read on to find out more about the tests and how zIPS fared.
To meet CMMC compliance, you need to prove that you have a comprehensive approach to mobile device security. Learn how Zimperium zIPS MTD solution helps enterprises and government agencies in the DIB to meet current CMMC standards as part of their mobile device security controls.