Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Managing Apps on BYO and Managed Devices: How to Enforce Policies Domenica Lee Crognale, SANS; JT Keating, Zimperium; Kern Smith, Zimperium The number of organizations banning applications due to surveillance and spyware concerns on employee devices continues to grow In 2020, the average s... 1 month ago | 64 mins The Best Defense is ATT&CK: Applying MITRE ATT&CK to Your Organization Bill Carter, Ross Weisman, Etay Maor MITRE ATT&CK has become the language defenders use when analyzing adversaries. MITRE’s database of tactics and techniques enables multiple teams, incl... June 19, 2023 9:00am Strengthening Cybersecurity Defenses: Key Investment Priorities for CISOs & CIOs Rick Meder, SonicWall VP Strategic Partnerships and Solution Architecture & Michael Sampson, Osterman Research Analyst LIVE DISCUSSION between SonicWall and Osterman Research Cybersecurity Experts Cybersecurity budgets are on the rise in 2023, enabling organizations t... 2 weeks ago | 60 mins Demo Series: zShield | Plus a Deep Dive on Implementing zShield in Android Apps Dan Butzer, Sr System Engineer at Zimperium All caught up on the latest benefits of app hardening and code obfuscation, but interested in learning more about the inner workings? Join a member of... 3 weeks ago | 30 mins Ways DNS is exploited in Modern Malware Attacks John Grady, Senior Analyst with Enterprise Strategy Group * Bob Hansmann, Senior Product Marketing Manager at Infoblox Cyber threats that leverage DNS are widespread, sophisticated, and rapidly evolving. DNS is used by over 90 percent of malware and in an ever-growing ... 4 weeks ago | 26 mins Innovation Showcase Ep.4:Mobile Device Management and Security Verizon When devising a security policy, IT managers will need to examine multiple components. Some of these components are hardware, Operating Systems (OS),... 2 months ago | 30 mins The Best Defense is ATT&CK: Applying MITRE ATT&CK to Your Organization Bill Carter, Ross Weisman, Etay Maor MITRE ATT&CK has become the language defenders use when analyzing adversaries. MITRE’s database of tactics and techniques enables multiple teams, incl... July 3, 2023 1:00am Challenges of Protecting Mobile BYOD Against the Modern Threat Landscape SlashNext With the expansion of today’s threat landscape to mobile, security awareness training, is not enough to keep employees and corporate data safe. Which ... 1 month ago | 15 mins How Government Organizations Can Quickly Enforce Mobile App Bans Kern Smith, VP of Sales Engineering for the Americas at Zimperium; Miguel Sian, SVP of Technology at Merlin The White House has given Federal agencies 30 days to remove a popular social media app from all government-issued devices and to prohibit future traf... 2 months ago | 23 mins Discover the latest cyber threat trends Michelle Drolet, Founder & CEO | Towerwall What does your cybersecurity posture look like in 2023? Tune into this webinar from Towerwall Founder and CEO Michelle Drolet as she discusses the lat... 2 months ago | 47 mins Load more