Zimperium- The State of Mobile Payment...
As widespread worldwide adoption of smartphones continues, and as global consumers conduct an increasing proportion of their shopping online due to the restrictions imposed by the last two plus years of a global pandemic, mobile transactions have skyrocketed. Yet, two years ago just prior to the first outbreaks of COVID-19, the Pew Charitable Trusts published research that suggested distrust and avoidance of mobile payments was common due, pri...
Zimperium- The Global Mobile Threat Rep...
As the worldwide leader in mobile threat defense (MTD), Zimperium protects millions of mobile devices and apps. As a result, we have unmatched forensic data about mobile device, network, phishing, and app risks and attacks. After analyzing the full breadth of our 2021 anonymized data, we’ve gleaned unique insights on the state of mobile security that we’re sharing in our Global Mobile Threat Report. On the heels of the release of t...
From Fares to Surfing: Why Leading MTAs...
As MTAs continue to evolve and improve their digital experiences, mobile components have become more vital. While mobile payment apps and onboard WiFi networks benefit riders, they also create new attack vectors for attackers. Leading MTAs are taking proactive measures to protect riders against these risks. Join cybersecurity leaders from Los Angeles Metro and Zimperium for a discussion on the best ways to protect riders against mobile cyberth...
Zimperium- The Evolution of BYOD and En...
Microsoft Office 365 has been the primary enterprise productivity suite for years, launching on traditional endpoints and eventually moving to mobile devices. Now, during this distributed workforce era where employers and employees are more reliant on mobile, more corporate data is transferred through Outlook and Teams, opening the door to intellectual property and PII on mobile endpoints than ever before. But despite having access to much of...
Zimperium: How to Protect Your Enterpri...
How to Protect Your Enterprise Against the Pegasus Attack Best practices from detecting & defeating the spyware since 2016 August 5, 202111am EDT / 4pm UTC+130 Minutes According to recent reports, mobile devices of 50,000 individuals from 50 countries have been under attack by a new variation of an aggressive mobile spyware known as Pegasus. Enterprise security professionals need to know how to protect their mobile endpoints, and ultimatel...
Protecting BYO Mobile Devices within Ze...
ATARC Presents in Partnership with Zimperium An open discussion with experts from the National Institute of Standards and Technology (NIST), the MITRE Corporation, and U.S. Department of Defense. The distributed workforce has changed the face of cybersecurity, bringing enhanced access controls like Zero Trust to the forefront, enabling employees to be productive anywhere in the world… even on BYO mobile devices. Recently, the National...
#1 Way to Reduce Mobile Fraud (That You...
Traditional approaches for fraud prevention rely heavily on user, account, and transaction data. But for transactions that originate from a mobile app, very little is known about the health of the mobile device. This is the most important cause of mobile fraud… one that is a growing problem considering that a significant amount of mobile fraud occurs on the device via malware, bots, and emulators. The only way to combat these sophistic...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.