HackDig : Dig high-quality web security articles

Zimperium Collaborates with Oracle to Provide Mission Critical Mobile Security to Customers

Customers Offered Greater Visibility with Oracle Cloud Infrastructure Today, Zimperium –  a leader in enterprise mobile security and a member of Oracle PartnerNetwork (OPN) – announced that we are collaborating with Oracle to offer our mobile threat defense (MTD) solutions on Oracle Cloud Infrastructure (OCI). We are working together with Oracle
Publish At:2021-03-30 11:07 | Read:240 | Comments:0 | Tags:Mobile Security BYOD mobile attacks mobile devices Mobile se

NIST’s Guidelines to Improving BYOD Mobile Device Security and Privacy

Over the last several months, Zimperium has been working closely with the National Cybersecurity Center of Excellence (NCCoE) at the National Institute of Standards and Technology (NIST) on a mobile device security project.   The NCCoE is a collaborative hub where industry organizations, government agencies, and academic institutions work together to addres
Publish At:2021-03-18 14:15 | Read:231 | Comments:0 | Tags:Mobile Security BYOD Mobile security mobile threat defense N

Top 4 Threats to O365 on Mobile Devices (and How to Stop Them)

Enterprises are continuing to work remotely and use BYO mobile devices. Doing so enables cost savings from a corporate standpoint and better user satisfaction from an employee standpoint. It also introduces and keeps Microsoft’s O365 as a mainstay.  I recently hosted a webinar with our very own Kern Smith, Vice President of Solution Engineering, on the top
Publish At:2021-03-15 08:15 | Read:290 | Comments:0 | Tags:O365 BYOD Mobile security zIPS

Top 3 Ways to Protect Microsoft Teams on BYO Mobile Devices

During a recent webinar on the Top Five Mobile Security Stories of a Crazy 2020, I listed my number one story around COVID-19 creating a situation unlike anything any of us have ever seen; yet one that will likely leave permanent changes in remote working and learning.  With the overnight shift towards entire workforces working remotely from home, on all va
Publish At:2020-11-10 13:02 | Read:819 | Comments:0 | Tags:App Security apps BYOD Microsoft Teams

Top 5 Mobile Security Stories of a Crazy 2020

2020 has been crazy… to say the least.  But in many ways, 2020 has thrust a huge spotlight on something we’ve known for quite some time – – mobile threats are real and mobile devices and apps need protection. It truly is crazy how many stories we’ve seen – and the year isn’t over yet – where the need for mobile security is front and
Publish At:2020-10-22 12:44 | Read:879 | Comments:0 | Tags:Mobile Security advanced mobile threat defense Android apps

4 Ways zIPS with Samsung Knox Transforms Mobile Devices Into High-Security Endpoints

Mobile device security hasn’t always been an enterprise’s top priority. The gradual evolution of smartphone technology, the intensely personal relationship between users and their devices, and the BYOD conundrum early on all contributed to that mindset. But, Samsung mobile devices can now be among the most secure endpoints in your enterprise. The transforma
Publish At:2020-08-05 19:17 | Read:1263 | Comments:0 | Tags:Mobile Security Mobile Threat Defense BYOD mobile threat def

The Modern Workplace: Keeping Remote Workers Productive and Secure

Results from the March 30, 2020, Gartner CFO Survey indicate that 74% of businesses intend to shift some employees to permanent remote work following their initial experience responding to current global conditions. Regardless of recent world events, many workers already spend time on the job, while physically separated from the corporate campus. Sometimes t
Publish At:2020-06-30 13:48 | Read:1088 | Comments:0 | Tags:Endpoint Mobile Security Risk Management BYOD Bring-Your-Own

What Truly Matters for Remote Workers Using GFE and BYOD Mobile Devices

The world has changed and we all know it. Mobile operations are at the forefront of every organization and so is mobile security. We’ve all seen attacks as simple as malicious apps, SMS phishing and man-in-the-middle attacks; to the more challenging, such as elevation of privileges, exfiltration of data and command and control manipulation. What you may not
Publish At:2020-05-24 07:37 | Read:1452 | Comments:0 | Tags:Mobile Security advanced mobile threat defense BYOD cyber se

Top 5 Ways to Secure All Remote Workers with Microsoft & Zimperium

I had the pleasure of recently conducting a timely webinar on the Top Five Ways to Secure All Remote Workers with two executives from our partners at Microsoft – – Dave Randall, Senior Program Manager of Endpoint Manager, and Aasawari Navathe, Program Manager. The world changed overnight Even before the pandemic, it’s surprising how quickl
Publish At:2020-05-18 11:56 | Read:1100 | Comments:0 | Tags:Mobile Security advanced mobile threat defense BYOD Complian

9 Best Practices from X-Force Red for Organizations and Employees

As employers rapidly respond to the need to protect their workforces from potential exposure and spread of the novel coronavirus, also known as COVID-19, many organizations are making the very difficult decision to pivot to a work-from-home model. This means employees will be connecting to corporate networks from whichever device is available: laptops, phone
Publish At:2020-03-18 16:57 | Read:1322 | Comments:0 | Tags:Application Security CISO Data Protection Threat Intelligenc

How We Learned to Stop Worrying and Embrace Remote Work

The industry is in the midst of a transformation. In this case, it isn’t the omnipresent digital transformation but rather a sudden tectonic shift towards remote work. For many organizations built on the classic, communal office space, this can seem daunting. Many employees have started to work from home, and some are throwing a wrench in the machine by conn
Publish At:2020-03-18 13:10 | Read:6944 | Comments:0 | Tags:CISO Identity & Access Mobile Security Network BYOD Bring-Yo

Explained: the strengths and weaknesses of the Zero Trust model

In a US court of law, the accused are deemed to be innocent until proven guilty. In a Zero Trust security model, the opposite is true. Everything and everyone must be considered suspect—questioned, investigated, and cross-checked—until we can be absolutely sure it is safe to be allowed. Zero Trust is a concept created by John Kindervag in 2010 during his
Publish At:2020-01-28 16:50 | Read:1613 | Comments:0 | Tags:Explained byod cloud framework identity management insider t

Zimperium Integrates Mobile Threat Defense into Microsoft Defender Advanced Threat Protection

The days of “leaving work at your desk” are long gone. Today, employees are mixing business with pleasure at all hours, in different places. It could be checking your email at halftime of your daughter’s soccer game; reviewing an Excel sales forecast spreadsheet while waiting for a friend at dinner; or, finishing up an overseas partner call while in line fo
Publish At:2020-01-23 17:25 | Read:1717 | Comments:0 | Tags:Mobile Security advanced mobile threat defense BYOD mobile d

Zimperium Announces Mobile Threat Defense for BYOD users with Microsoft Intune

Today, Microsoft announced an exciting new capability providing additional benefits to users of apps protected by Microsoft Intune app protection policies. You can read the official announcement here. Zimperium device risk-based evaluation is now integrated with Microsoft Intune for protected apps on non-enrolled devices to add another layer of protection f
Publish At:2019-11-12 00:25 | Read:1981 | Comments:0 | Tags:Mobile Security Mobile Threat Defense News Partners BYOD Ent

7 Questions to Ask Your Child’s School About Cybersecurity Protocols

Just a few weeks into the new school year and, already, reports of malicious cyberattacks in schools have hit the headlines. While you’ve made digital security strides in your home, what concerns if any should you have about your child’s data being compromised at school? There’s a long and short answer to that question. The short answer is don’t
Publish At:2019-09-19 23:20 | Read:2583 | Comments:0 | Tags:Family Safety BYOD cyberattack cybercrime cybersafety cybers