All posts tagged: advanced mobile threat defense

What exactly is a mobile ______ attack?

Mobile devices contain or have access to the same information as traditional endpoints. While billions of dollars have been spent protecting and securing traditional endpoints, very little has been invested to protect mobile device endpoints. Attackers work on the same model as any other business: where do they get the […]

Read more

Mobile Is Another Endpoint: MITRE ATT&CK Framework for Mobile

  This is the second webinar in a two-part series on how two non-profit organizations, the Center for Internet Security (CIS) and MITRE have adapted best practice guidelines to include mobile. The first webinar focused on CIS’ 20 Critical Security Controls.  CISOs and CIOs know MITRE ATT&CK is a globally-accessible […]

Read more

5 Must-Have Sections For Every Enterprise Mobile Security RFP – Must-Have #4: Security Technology & Workflow Integrations

Our fourth webinar in our series of “The 5 Must-Have Sections for Every Enterprise Mobile Security Request For Proposal (RFP)” reviews Security Technology & Workflow Integrations, and took place on July 17, 2019. Mobile security exists at an intersection where mobile technology professionals and security professionals both have key roles. […]

Read more

5 Must-Have Sections For Every Enterprise Mobile Security RFP – Must-Have #3: Mobile Technology & Workflow Integrations

Our third webinar in our series of “The 5 Must-Have Sections for Every Enterprise Mobile Security Request For Proposal (RFP)” examined Mobile Technology & Workflow Integrations, and took place on July 10, 2019. JT Keating, Vice President of Product Strategy and someone who has responded to literally hundreds of RFPs, led the session […]

Read more

Get started with Zimperium today