Posts about MTD (6)

Q&A with CISA’s Jen Easterly: Every Part Of Our Interconnected Ecosystem Needs Securing, Including Mobile

MTD
5 minutes
Nov 08, 2023
Jen Easterly, the new Director of the Cybersecurity & Infrastructure Security Agency CISA, recently sat down for a great, relaxed, and open discussion
Read Full Post

Harnessing NIST Standards for Your Mobile-First Security Strategy

MTD
11 minutes
Nov 01, 2023
This webinar teaches how cybersecurity professionals rely on resources, such as NIST standards, to develop their mobile device security approach.
Read Full Post

Okta Identity Threat Protection Platform

Partners
3 minutes
Oct 04, 2023
Zimperium MTD integrates real-time threat intelligence & rich threat context into the Okta Identity Threat Protection platform for rapid risk assessment.
Read Full Post

Predator Spyware Strikes Again

MTD
2 minutes
Sep 27, 2023
On September 22nd, Citizen Lab, in collaboration with Google Project Zero, released a joint report revealing that Ahmen Eltantawy, a former Egyptian
Read Full Post

Unveiling the Tactics of Lapsus$: A Review of Internal Attacks Vectors, Mobile Device Exploitation, and Social Engineering Techniques

Threat Research
5 minutes
Aug 29, 2023
On August 10, 2023, the U.S. Department of Homeland Security (DHS) released the Cyber Safety Review Board (CSRB) report summarizing the findings of its
Read Full Post

OilAlpha: Learn How Zimperium MTD Protects Against This New Threat

Threat Research
2 minutes
May 18, 2023
Learn about emerging threats from the OilAlpha group and how Zimperium MTD customers are protected against the OilAlpha group and other similar threats.
Read Full Post

NIS2 - Applying the New NIS Directive to Mobile Devices

Compliance
8 minutes
May 08, 2023
Learn all about the NIS2 and how the EU Parliament’s updated NIS directive applies to mobile devices.
Read Full Post

Risky Apps: How They Can Pose Threats to Your Security

Zimperium
7 minutes
Apr 13, 2023
BYOD devices may include risky apps used for non-work purposes. These apps can create data protection risks that a mobile threat defense should address.
Read Full Post