Securing Mobility: Navigating the NIST Enterprise Mobile Device Lifecycle

Securing Mobility: Navigating the NIST Enterprise Mobile Device Lifecycle

Mobile devices are the cornerstone of enterprise operations, enabling flexibility, productivity, and connectivity like never before. In an era where agility and accessibility are paramount, employees and officials rely heavily on their mobile devices to access critical information, regardless of location. However, ensuring the security of these devices is necessary for organizations to uphold operational…

QR Code Phishing: How Enterprises Can Stay Secure

QR Code Phishing: How Enterprises Can Stay Secure

QR codes have surged in popularity in the past two years, mainly due to their convenient and touchless features that streamline daily transactions-making it easy for users to scan and access information quickly. Nearly 89 million smartphone users in the U.S. have scanned a QR code, with growth projected to reach over 100 million users by 2025. However, the…

Zimperium etablerades som ledare för Mobile Threat Management (MTM) under 2023 SPARK Matrix™ av Quadrant Knowledge Solutions

Zimperium etablerades som ledare för Mobile Threat Management (MTM) under 2023 SPARK Matrix™ av Quadrant Knowledge Solutions

Quadrant Knowledge Solutions SPARK Matrix™ tillhandahåller konkurrensanalys och rankning av de ledande leverantörerna inom Mobile Threat Management (MTM). Zimperium har, tack vare sin omfattande teknik och kundupplevelsehantering, fått starka betyg över parametrarna för teknisk excellens och kundpåverkan. Den 19 oktober 2023 tillkännagav Quadrant Knowledge Solutions att de har utsett Zimperium som teknikledare inom SPARK Matrix™…

IBM Security MaaS360 Announces Partnership with Zimperium

IBM Security MaaS360 Announces Partnership with Zimperium

IBM Security® MaaS360®, one of the unified endpoint management (UEM) leaders, joins forces with Zimperium, a global leader in mobile device and app security, to offer organizations a comprehensive solution to manage and protect their mobile ecosystem. Starting 30 January, IBM Security will sell to organizations Zimperium’s Mobile Threat Defense (Zimperium MTD) product together with its own MaaS360 editions.  To…

New Year, New Hires, New Devices: Kick Start the Year with Endpoint Security

New Year, New Hires, New Devices: Kick Start the Year with Endpoint Security

As we welcome the new year, businesses around the world are gearing up for growth and expansion. One critical aspect of growth is hiring new employees, who will need access to different devices and networks to complete their tasks effectively. However, with this growth comes the need to protect valuable data and networks from cyber…

Mobile Banking Heists: The Emerging Threats and How to Respond

Mobile Banking Heists: The Emerging Threats and How to Respond

The past year has witnessed significant technological advancements in the banking and financial management which have greatly improved convenience for customers while also increasing security risks that should not be taken lightly. The financial industry has transformed mobile devices into a personal ATM for customers, offering services ranging from payments to cryptocurrencies, banking to investments….

Unveiling the Persisting Threat: Iranian Mobile Banking Malware Campaign Extends Its Reach

Unveiling the Persisting Threat: Iranian Mobile Banking Malware Campaign Extends Its Reach

Research by Aazim Bill SE Yaswant and Vishnu Pratapagiri In July 2023, it was discovered that  an Android mobile campaign, which consisted of banking trojans, was targeting major Iranian banks. Zimperium’s research team recently found that the campaign not only remains active but also extended its capabilities. These newly found samples are completely undetected by the industry. At the same…

Addressing NIS2 Requirements: Why it’s Time to Get Ready Now

Addressing NIS2 Requirements: Why it’s Time to Get Ready Now

Regulatory mandates. Whatever you may think of their intention, execution, or implications, they’re a critical part of the landscape for security teams. This is particularly true for organizations based in the EU and for entities that do business with EU-based organizations. A new directive will be introduced within the next year that promises to have…

5 Key Principles for Securing Today’s Mobile-First Businesses

5 Key Principles for Securing Today’s Mobile-First Businesses

Businesses in a variety of sectors and industries are increasingly becoming mobile-powered. Through mobile devices and applications, organizations are delivering more convenience, boosting productivity, and speeding innovation. As such, we’re now seeing the rise of the mobile-first business. The emergence of the mobile-first business has fundamental implications for security teams. The explosive growth in mobile…

Leveraging NIST Standards to Streamline Your Mobile-First Security Strategy 

Leveraging NIST Standards to Streamline Your Mobile-First Security Strategy 

There is no doubt that mobile devices continue to play an increasingly important role in our daily lives. They’re the devices we use to connect with friends and family, stay informed, and be entertained. This shift towards mobile has prompted companies to transform into mobile-powered businesses. Users’ increased reliance on mobile devices has introduced growing…