Jonathan Blackman

It’s Not Your Father’s Endpoint | How Do You Protect Mobile Devices?

MTD
3 minutes
Sep 05, 2019
In the first three blogs of this series, I discussed why mobile devices are easy prey, what data is at risk, and how mobile devices can be hacked. For the
Read Full Post

It’s Not Your Father’s Endpoint - Four Ways The Bad Guys Attack Mobile Devices

MTD
3 minutes
Jun 27, 2019
In our second blog, I discussed why a mobile device needs to be protected.  Exactly what are we talking about here? What are the ways an attacker can hack
Read Full Post

It’s Not Your Father’s Endpoint - What if a Mobile Device is Attacked?

Threat Research
2 minutes
May 20, 2019
In my first blog, I discussed why mobile devices are the likely choice for savvy attackers since they typically have no endpoint protection. Let's
Read Full Post

Endpoint Protection for Mobile Devices | It's Not Your Father's Endpoint

MTD
3 minutes
May 08, 2019
First in a series of four blogs on mobile device security Mobile devices - used today for everything from corporate and personal email access to tools
Read Full Post