As mobile has taken the lead in enabling enterprise user productivity, it has also become a prime focus for hackers. This reflects the reality that mobile endpoints have all the same access to corporate network resources and data as traditional endpoints and they are critical to Zero Trust/two-factor authentication efforts. […]