Roxane Suau

Recent Posts

Why Updating Mobile OS And Application Is So Important

Posted by Roxane Suau on May 12, 2020

System and application updates always seem to pop up at less than timely moments, and most of us postpone them without second thoughts, for days, weeks, months… However, these updates represent an essential piece of systems’ stability and safety, as they include functionality enhancements and patches to security holes.

 

Read More

A basic wallpaper app dressed up into a COVID-19 info app

Posted by Roxane Suau on April 16, 2020

In those troubled times, the world population demonstrates each day an unprecedented outpouring of solidarity, goodwill and aid. Unfortunately, the Covid-19 pandemic might also be leveraged as a business opportunity as per the following example.

 

Read More

COVID-19 | Mobile usage evolution and security stakes

Posted by Roxane Suau on April 08, 2020

If we are requested to not be physically mobile, mobile usages are booming due to the COVID-19 pandemic. It is no surprise that business applications are heading the list with remote working being enforced in many organizations. From an individual perspective, the containment drastically impacted our daily mobile activity with a general increase of time spent on our devices and a booming usage of social and entertainment apps (fitness, streaming…).

 

Read More

Actionable insights to secure remote workers

Posted by Roxane Suau on March 26, 2020

The pandemic situation requires governments to actively enjoin companies to set up remote working.

To keep up as much as possible with activities, enterprises are issuing additional corporate-owned devices or enabling BYOD usages multiplying access points to corporate data.

 

Read More

What Zero Trust means for mobile security?

Posted by Roxane Suau on March 16, 2020

The Zero Trust model, first identified by the research firm Forrester, is a security approach based on the principle of not trusting any network or data access request by default, even when it comes from inside the company perimeter. Zero Trust goes beyond the identity approach which focuses on only authenticating the user. It has emerged as the most reliable way for companies to keep away cyberthreats evolving within their distant and immediate environment.

 

Read More