Zero Trust Explained – But What About BYOD?
With the rise of “Zero Trust” implementation into IT networks we take a look at its definition, why it’s on the rise, key benefits, basic…
With the rise of “Zero Trust” implementation into IT networks we take a look at its definition, why it’s on the rise, key benefits, basic…
From EPP to EDR, WFH to BYOD, there are many trends (and acronyms) that IT security professionals need to be aware of and cater to…
Update: MWC Barcelona 2020 has been cancelled due to Coronavirus concerns – read the GSMA’s official statement, here.
Join us for our…
On October 3rd, DeviceAssure headed to New York to give a presentation at the Cyber Security Summit.
We were joined by industry leaders, security experts and…
Counterfeit devices are an enterprise cybersecurity threat.
Three parallel trends are now increasing the threats counterfeit devices pose to enterprise networks:
They are getting much better –…
We’re delighted to announce that DeviceAssure has picked up its first award for Mobile Innovation!
The IHS Markit Innovation Awards recognizes innovative products from companies exhibiting…
In July 2018, Motherboard published details of a fake iPhone, investigated by Trail Of Bits, a New York-based software security group.
We…
Threat intelligence firm Check Point Research have released details of malware designed to exploit known Android vulnerabilities. It’s claimed to have…
DeviceAssure will be attending at Black Hat USA which is taking place from 3rd August-8th August at Mandalay Bay in Las Vegas. Black Hat brings…
The problem of non-standard smartphones and devices isn’t entirely new.
For many years, hobbyists and the tech-inclined have enjoyed “jailbreaking” smartphones, a process which removes many…
18
counterfeits32
enterprise15
events6
financial services9
manufacturers11
online-brands11
regulators25
secondary-device-market13
security29
Uncategorized2