All posts tagged: advanced mobile threat defense

5 Must-Have Sections For Every Enterprise Mobile Security RFP – Must-Have #4: Security Technology & Workflow Integrations

Our fourth webinar in our series of “The 5 Must-Have Sections for Every Enterprise Mobile Security Request For Proposal (RFP)” reviews Security Technology & Workflow Integrations, and took place on July 17, 2019. Mobile security exists at an intersection where mobile technology professionals and security professionals both have key roles. […]

Read more

5 Must-Have Sections For Every Enterprise Mobile Security RFP – Must-Have #3: Mobile Technology & Workflow Integrations

Our third webinar in our series of “The 5 Must-Have Sections for Every Enterprise Mobile Security Request For Proposal (RFP)” examined Mobile Technology & Workflow Integrations, and took place on July 10, 2019. JT Keating, Vice President of Product Strategy and someone who has responded to literally hundreds of RFPs, led the session […]

Read more

The Mobile Watering Hole: How A Sip Leads to A Trojan Compromise

“Watering Hole” is a cyber attack strategy in which the victim is a particular group (organization, industry, or region). In this attack, the attacker typically observes which websites or applications the group often uses and infects one or more of them with malware. Eventually, some members of the targeted group […]

Read more

5 Must-Have Sections For Every Enterprise Mobile Security RFP – Must-Have #1: Advanced, Purpose-Built Threat Detection

Our first free webinar in our series of “The 5 Must-Have Sections for Every Enterprise Mobile Security Request For Proposal (RFP)” deals with Advanced, Purpose-Built Threat Detection, and took place on June 19, 2019. Mobile operating systems (OSs) are fundamentally different from other endpoint OSs. The reality is, mobile devices are now the […]

Read more

Another Day, Another App Breach

  They say it happens in threes. This time, the three are: Flipboard, the social sharing site and news aggregator, reset millions of user passwords after hackers gained access to its systems several times over a nine-month period; Developer platform Stack Overflow earlier this month confirmed a breach involving “a […]

Read more

Get started with Zimperium today