Alyson Lynch

The Silicon Review Awards Zimperium with "10 Fastest Growing Cyber Security Companies 2018"

Zimperium
1 minutes
Jul 30, 2018
Zimperium is honored to be listed on The Silicon Review's "10 Fastest Growing Cyber Security Companies 2018" list. In the magazine’s July issue, they
Read Full Post

How To Protect Billions Against Mobile Banking Fraud: Open Your Eyes!

Zimperium
2 minutes
Jul 26, 2018
Webinar to discuss how banking organizations can secure their mobile banking apps while not impacting the user experience. Zimperium is providing banking
Read Full Post

Zimperium Named to Analytics Insight Magazine's "10 Most Innovative Companies in Machine Learning 2018"

Zimperium
1 minutes
Jul 19, 2018
Zimperium has been named to Analytics Insight Magazine's "10 Most Innovative Companies in Machine Learning 2018" list and is the featured cover story of
Read Full Post

Webinar: Don’t Get Caught in the Phishing Net

Zimperium
2 minutes
Jun 27, 2018
Webinar will cover how phishing is evolving, the damages it causes, unique challenges presented to mobile users and how companies can protect against.
Read Full Post

Webinar: The State of Mobile Device Security in Government

Zimperium
2 minutes
Jun 19, 2018
Webinar to highlight emerging mobile cybersecurity threats facing state and local governments, and what these entities can do to better protect mobile
Read Full Post

Webinar: How Was Your GDPR Transition and What Can You Learn from It?

Compliance
1 minutes
Jun 15, 2018
Webinar to discuss the adoption of new GDPR regulations and how enterprises are protecting mobile devices and apps in the process. Zimperium is hosting a
Read Full Post

Webinar: Device Detection – To Cloud or Not to Cloud

Zimperium
2 minutes
Jun 11, 2018
Webinar to discuss the pros and cons of both on-device detection and detection in the cloud and the many ways on-device detection outweighs the cloud in
Read Full Post

Webinar: Rise of the Machine (Learning)

Zimperium
1 minutes
May 23, 2018
Webinar will share the use of machine learning in mobile security and how to identify the machine learning solutions that are (and are not) effective in
Read Full Post