Roxane Suau

Recent Posts

C-Executives, IT, sales… Which staff is the most exposed to mobile threats?

Posted by Roxane Suau on March 12, 2019

Nowadays, the vast majority of employees is using smartphones or tablets as part of their work. Those devices, whether they are corporate (COPE) or personal (BYOD), are a gateway to organizations information systems.

Read More

Pradeo's biannual mobile security report: The current mobile threat landscape

Posted by Roxane Suau on March 05, 2019

In the corporate sector, smartphones, tablets and mobile applications are trusted with confidential information and granted access to companies’ information systems.

 

 

Read More

Meet the Pradeo team at RSA Conference 2019

Posted by Roxane Suau on February 27, 2019

The Pradeo team will be attending RSA Conference in San Francisco.

 

 

Read More

Pradeo wins 5 Awards from the Cybersecurity Excellence Jury

Posted by Roxane Suau on February 26, 2019

The Cybersecurity Excellence jury has released today the names of the best cybersecurity solutions it has awarded in 2019.

We are proud to announce that Pradeo has won the award for mobile security solution of the year, along 4 other prizes for its advanced solutions including Mobile Threat Defense, Mobile Application Security Testing, Runtime Application Self-Protection and GDPR compliance solution.

 

Read More

The network threats that endanger mobile devices privacy

Posted by Roxane Suau on February 14, 2019

Along the massive growth of enterprise mobility, cybercriminals looking for valuable data naturally shifted their interest toward mobile devices. Indeed, smartphones and tablets have inherent capabilities that, when exploited illegally, can provide a direct access to all the data they manipulate. Mobile threats can operate at three different layers of a device: 77% of them use mobile applications, 14% exploit the OS and 9% leverage the network. 

From phishing attempts to the more sophisticated Man-In-The-Middle, this article presents the most common network attacks used to exfiltrate data from mobile devices in the corporate environment.

 

Read More