Zimperium Blog

My Four Truths (So Far) Regarding Mobile Security

MTD
5 minutes
Sep 18, 2019
I started working at Zimperium late January this year in the marketing communications department, and well...I’m busy.   Every day is something new.
Read Full Post

The Other Half of the Equation: Why UEMs Need MTD

MTD
1 minutes
Sep 17, 2019
According to Gartner’s 2019 Hype Cycle for Endpoint Security, “Enterprises with average security requirements that do not provide much more than email to
Read Full Post

When to Use In-App Protection

MAPS
8 minutes
Sep 12, 2019
There are more than 5 million apps in the app stores. Most of these apps fit into the gaming, business, education, lifestyle, entertainment, and utility
Read Full Post

The Other Half of the Equation: How MTD Completes EPP/EDR

MTD
1 minutes
Sep 10, 2019
According to Gartner’s 2019 Hype Cycle for Endpoint Security, “As traditional endpoint security remodernizes and mobile security innovation slows down,
Read Full Post

It’s Not Your Father’s Endpoint | How Do You Protect Mobile Devices?

MTD
3 minutes
Sep 05, 2019
In the first three blogs of this series, I discussed why mobile devices are easy prey, what data is at risk, and how mobile devices can be hacked. For the
Read Full Post

Malicious Websites Put iOS Devices At Risk

Threat Research
3 minutes
Aug 30, 2019
In an excellent and deep blog analysis, Ian Beer of Google’s Project Zero outlines five separate iOS exploit chains that were found on a small collection
Read Full Post

Don’t Let Liberating Your Employees Give Freedom to Hackers

MTD
2 minutes
Aug 29, 2019
Liberation. It’s a powerful word. It’s about freedom from limits on thought or behavior.  The reason why I bring this up is because I recently heard from
Read Full Post

New iOS Jailbreak Tools put Organizations at Risk

Threat Research
2 minutes
Aug 23, 2019
According to iDownloadBlog.com (iDB), “in an unforeseen turn of events, hacker Pwn20wnd released v3.5.0 of the unc0ver jailbreak tool to the general
Read Full Post