Mobile Applications
Mobile Application Security
Mobile Application Protection Suite (MAPS)
zScan
zKeyBox
zShield
zDefend
Mobile Devices
Mobile Device Security
Mobile Threat Defense (MTD)
MTD for Chromebooks
zSecure Resident Safety
Mobile Phishing Protection
Solutions
Mobile Security Solutions by Industry
Financial Services
Federal
Government
Media & Entertainment
Retail
Automotive
Company
Company
About Us
Blog
Careers
Support
Partners
Become a Partner
CONTACT US
☰
Menu
Mobile Applications
›
Mobile Application Security
›
Mobile Application Protection Suite (MAPS)
zScan
zKeyBox
zShield
zDefend
Mobile Devices
›
Mobile Device Security
›
Mobile Threat Defense (MTD)
MTD for Chromebooks
zSecure Resident Safety
Mobile Phishing Protection
Solutions
›
Mobile Security Solutions by Industry
›
Financial Services
Federal
Government
Media & Entertainment
Retail
Automotive
Company
›
Company
›
About Us
Blog
Careers
Support
Partners
›
Become a Partner
Posts about iOS & Android (31)
Zimperium’s Compliance Webinar Series: CCPA Compliance for Mobile Devices - The 60% of Endpoints Often Unprotected
Compliance
2 minutes
Jun 04, 2019
The California Consumer Privacy Act (CCPA) has been characterized as “the beginning of America’s General Data Protection Regulation (GDPR),” and its aim
Another Day, Another App Breach
Zimperium
4 minutes
May 29, 2019
They say it happens in threes. This time, the three are: Flipboard, the social sharing site and news aggregator, reset millions of user passwords
BYOD Security | Employee Mobile Devices vs Your Network
MDM
3 minutes
May 28, 2019
It used to happen all the time. People actually carried a work phone and a personal phone. There used to be a real cost to how companies and their
It’s Not Your Father’s Endpoint - What if a Mobile Device is Attacked?
Threat Research
2 minutes
May 20, 2019
In my first blog, I discussed why mobile devices are the likely choice for savvy attackers since they typically have no endpoint protection. Let's
Mobile Security Threats | Where's the Fire in Mobile Device Security?
MTD
3 minutes
May 09, 2019
Cybersecurity compromises are commonplace in the news, but rarely is it cited the compromise involved a mobile device. Attribution typically falls to
Endpoint Protection for Mobile Devices | It's Not Your Father's Endpoint
MTD
3 minutes
May 08, 2019
First in a series of four blogs on mobile device security Mobile devices - used today for everything from corporate and personal email access to tools
You’ve Just Won $1,000! Lucky You!
Threat Research
4 minutes
Apr 23, 2019
We’ve all seen them. They are annoying; can be abusive and sometimes malicious. It goes something like this: You’re navigating a web page to read an
Zimperium Webinar Series: Seven Deadly (Mobile Security) Sins… According to CISOs; Seventh Sin - Opening an Entry Point to the Corporate Network
iOS & Android
1 minutes
Apr 23, 2019
Zimperium is hosting a series of webinars focusing on seven of the problem areas, or deadly sins, chief information security officers (CISOs) must
29
30
31
32
33