Imagine finding out your most recent departmental budget was only 40% of what it should be. If you’re like me, you’d get a strong feeling that “something is missing and it’s a real disaster.” Well, here’s the thing. If you’re a CISO – or if your job involves information security in general – you should … Read More
As government cyber teams feverishly perform damage control from the SolarWinds hack, one major question for CISOs and CIOs cannot be ignored: “Protecting traditional endpoints isn’t enough; how am I going to assess and protect my mobile devices?” Threat visibility comes from sensors, and if your mobile devices don’t utilize a mobile threat defense (MTD) … Read More
The post CISOs and CIOs: Protecting Traditional Endpoints Isn’t Enough appeared first on Zimperium Mobile Security Blog.
It’s been called the ‘scariest iPhone hack ever.’ According to a recent Ars Technica article, “Earlier this year, Apple patched one of the most breathtaking iPhone vulnerabilities ever: a memory corruption bug in the iOS kernel that gave attackers remote access to the entire device – over Wi-Fi, with no user interaction required at all. … Read More
The post ‘Scariest iPhone Hack Ever’ Illustrates Importance of Protecting Mobile Devices appeared first on Zimperium Mobile Security Blog.