JT Keating

JT Keating

Strategic Initiatives

VMware & Zimperium Demonstrate Best-of-Breed Unified Endpoint Security (UES) Approach Desired by Global 1000 CISOs

iOS & Android
4 minutes
Jul 22, 2020
I recently had the pleasure of hosting a webinar with VMware on our joint unified endpoint security (UES) approach leveraging VMware Workspace ONE
Read Full Post

See it for Yourself: Mobile Phishing and Malware Attacks on Remote Workers

iOS & Android
2 minutes
Jun 03, 2020
I recently had the opportunity to host an interactive webinar with Ryan Pringnitz, a senior consultant at Workspace ONE and Kern Smith, Zimperium’s VP of
Read Full Post

Global 1000 Security Execs: Mobile No Longer “The Forgotten Endpoint”

iOS & Android
4 minutes
May 22, 2020
As the global leader in mobile security, Zimperium is proud of the companies and governments that trust us to protect their mobile endpoints and
Read Full Post

Top 5 Ways to Secure All Remote Workers with Microsoft & Zimperium

iOS & Android
5 minutes
May 12, 2020
I had the pleasure of recently conducting a timely webinar on the Top Five Ways to Secure All Remote Workers with two executives from our partners at
Read Full Post

Addressing Critical iOS “Zero-Click” Mail Vulnerabilities

iOS & Android
3 minutes
Apr 27, 2020
Recently, two vulnerabilities were disclosed in the default iOS Mail application that have existed since 2012 (iOS 6). According to the disclosing
Read Full Post

Unified Endpoint Security with VMware & Zimperium

iOS & Android
5 minutes
Mar 22, 2020
We have said this many times: an endpoint is an endpoint is an endpoint. Today, users perform more than 80% of their daily work on mobile devices. These
Read Full Post

Security and Privacy Issues Found in Popular Dating Apps

MAPS
3 minutes
Feb 13, 2020
An estimated 25.1 million people used a dating app at least monthly in 2019, a 5.3% increase from the amount of users in 2018. While users may find love,
Read Full Post

Zimperium’s “State of Enterprise Mobile Security” Report for 2019

Zimperium
3 minutes
Feb 05, 2020
It is no longer a matter of if or when an enterprise’s mobile endpoints are at risk of being attacked - - they already are; that according to findings in
Read Full Post