According to Gartner’s 2019 Hype Cycle for Endpoint Security, “Enterprises with average security requirements that do not provide much more than email to
There are more than 5 million apps in the app stores. Most of these apps fit into the gaming, business, education, lifestyle, entertainment, and utility
According to Gartner’s 2019 Hype Cycle for Endpoint Security, “As traditional endpoint security remodernizes and mobile security innovation slows down,
In the first three blogs of this series, I discussed why mobile devices are easy prey, what data is at risk, and how mobile devices can be hacked. For the
In an excellent and deep blog analysis, Ian Beer of Google’s Project Zero outlines five separate iOS exploit chains that were found on a small collection
Liberation. It’s a powerful word. It’s about freedom from limits on thought or behavior. The reason why I bring this up is because I recently heard from