All posts by Andy Shane

Avatar photo
Author: Andy Shane

Posts by Andy Shane:

What exactly is a mobile ______ attack?

Mobile devices contain or have access to the same information as traditional endpoints. While billions of dollars have been spent protecting and securing traditional endpoints, very little has been invested to protect mobile device endpoints. Attackers work on the same model as any other business: where do they get the […]

Read more

Mobile Is Another Endpoint: MITRE ATT&CK Framework for Mobile

  This is the second webinar in a two-part series on how two non-profit organizations, the Center for Internet Security (CIS) and MITRE have adapted best practice guidelines to include mobile. The first webinar focused on CIS’ 20 Critical Security Controls.  CISOs and CIOs know MITRE ATT&CK is a globally-accessible […]

Read more

The State of Mobile Device Threats: 2019 H1 Mobile Threat Report

As the worldwide leader in mobile threat defense (MTD), no company protects more enterprise mobile devices than Zimperium. As a result, we have incredibly rich and unmatched forensic data about mobile device, network, phishing and app risks and attacks from all around the world.  Based on popular demand, Zimperium held […]

Read more

5 Must-Have Sections For Every Enterprise Mobile Security RFP – Must-Have #5: Deployment Technology & Workflow Integrations

Our final webinar in our series of “The 5 Must-Have Sections for Every Enterprise Mobile Security Request For Proposal (RFP)” reviews Deployment Technology & Workflow Integrations, and took place on July 24, 2019. JT Keating, Vice President of Product Strategy and someone who has responded to literally hundreds of RFPs, led the session. […]

Read more

5 Must-Have Sections For Every Enterprise Mobile Security RFP – Must-Have #4: Security Technology & Workflow Integrations

Our fourth webinar in our series of “The 5 Must-Have Sections for Every Enterprise Mobile Security Request For Proposal (RFP)” reviews Security Technology & Workflow Integrations, and took place on July 17, 2019. Mobile security exists at an intersection where mobile technology professionals and security professionals both have key roles. […]

Read more

Get started with Zimperium today