Resources

NIST’s Guidelines to Improving BYOD Mobile Device Security and Privacy

Over the last several months, Zimperium has been working closely with the National Cybersecurity Center of Excellence (NCCoE) at the National Institute of Standards and Technology (NIST) on a mobile device security project.   The NCCoE is a collaborative hub where industry organizations, government agencies, and academic institutions work together to […]

Read more

Top 4 Threats to O365 on Mobile Devices (and How to Stop Them)

Enterprises are continuing to work remotely and use BYO mobile devices. Doing so enables cost savings from a corporate standpoint and better user satisfaction from an employee standpoint. It also introduces and keeps Microsoft’s O365 as a mainstay.  I recently hosted a webinar with our very own Kern Smith, Vice […]

Read more

Chrome OS Now Second-Most Popular Desktop Operating System

For the first time in the annual desktop operating system market share reports, Chrome OS has passed macOS. According to 2020 numbers from market data firm IDC and a report on IDC’s data by publication GeekWire, Microsoft Windows still holds a commanding lead with more than 80 percent market share […]

Read more

Let’s Protect More than 40% of our Endpoints

Imagine finding out your most recent departmental budget was only 40% of what it should be. If you’re like me, you’d get a strong feeling that “something is missing and it’s a real disaster.” Well, here’s the thing. If you’re a CISO – or if your job involves information security […]

Read more

Zimperium Impresses; Named Top Cybersecurity Startup for 2021

“So, get ready to be really impressed,” Max Kurton of EM360 – a global technology platform – exclaimed as he revealed Zimperium as the number one cybersecurity startup of EM360’s Top 5 Cybersecurity Startups for 2021.  In the article – part of EM360’s Emerge5 series – Max writes, “With new […]

Read more

Apple’s Latest Security Fix Shows Why Enterprises Need MTD

Apple’s high-profile release of iOS 14.4, including security fixes for three critical vulnerabilities said to have been exploited by hackers in the wild, once again shows why enterprises need to deploy mobile threat defense (MTD) solutions.  Whether it is the Jeff Bezos hack or the ‘scariest iPhone hack ever,’ vulnerabilities […]

Read more

Get started with Zimperium today