Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date The First Half In Review: The Mobile Threat Landscape of 2022 Richard Melick, Director of Threat Insights and Product Strategy, Zimperium What has the first half of 2022 held for organizations all over the world attempting to emerge and return to the new version of normal that was create... 5 days ago | 33 mins Check Point Infinity - Defining the modern cyber security architecture (AMER) Cindi Carter - Field CISO @ Check Point How to secure your organization’s infrastructure and data in the most efficient way and at the lowest cost? Recent global market conditions and tren... 23 hours ago | 31 mins Check Point Infinity - Defining the modern cyber security architecture EMEA/APAC Cindi Carter - Field CISO @ Check Point How to secure your organization’s infrastructure and data in the most efficient way and at the lowest cost? Recent global market conditions and tren... 1 day ago | 39 mins The New “mHealth” Golden Age: What Are the Mobile Security Implications? Monique Becenti, Zimperium | Andrew Snyder, Zimperium Due largely to the global COVID-19 pandemic, we are now living in the golden era of mobile health, or “mHealth,” as it has come to be called. The Worl... July 21, 2022 3:00pm Worldwide Aerospace and Defense Contractors under Attack by Lazarus Jean-Ian Boutin, Director of Threat Research @ESET Global Advanced threat actors operating under the Lazarus umbrella have been relentlessly targeting worldwide defense contractors and aerospace companies for... 1 week ago | 23 mins MDM is Not Mobile Security: Why Mobile Threat Defense Achieves What MDM Cannot Monique Becenti, Zimperium With today’s increasingly distributed workforce, protecting data on mobile devices (both managed and BYOD) is not only essential but critical for the ... 2 months ago | 51 mins Securing O365 & Enterprise Apps on Mobile Devices: Recommendations from Gartner Chris Silva, VP Analyst with Gartner; and Jon Paterson, CTO with Zimperium Microsoft Office 365 and other productivity apps are now commonplace on both corporate and personal (BYO) mobile devices. According to Zimperium’s 202... 1 month ago | 47 mins Advanced AI & ML To Secure Your Mobile Workforce Adam Sloan, Principal Sales Engineer, APAC, BlackBerry The drastic increase in the number of devices has spawned a rise in mobile malware and cyberattacks as more and more organisations are adapting to a h... July 21, 2022 1:00am Monetize and Secure your 5G and Fiber Networks Mario Turner, Sr. Manager of Consumer Segment Product @ESET Discover how it will maximize the revenue potential of your mobile and fixed network, why ESET is the best partner with which to succeed, and the prod... 1 week ago | 25 mins 2022 DBIR Presents Episode 2: Human Element Jodi Ashford, Farzad Seihoun, Philippe Langlois The Verizon 2022 Data Breach Investigations Report (DBIR)—marking its 15-year anniversary—examines an unprecedented year in cybersecurity history. Joi... 5 days ago | 58 mins Load more