Stay up to date

Stay up to date

How to vet mobile apps before issuing them to collaborators
By Roxane Suau on June 30, 2020

Cybersecurity experts are unanimous, mobile apps are hackers’ preferred vector to exfiltrate valuable data from mobile devices. Yet, the flexibility...

Continue Reading
Application threat analysis/App vetting: how to separate key decision-making insights from pointless information
By Roxane Suau on June 26, 2020

Needless to emphasize that applications stand at the very heart of mobile usages. Except for very specific business cases, mobile workers require...

Continue Reading
Why cloning your app is a piece of cake?
By Roxane Suau on June 19, 2020

One thing is certain: cloning an application is a child’s play for cyber-criminals. Fake apps (or clones) are Android or iOS mobile applications that

Continue Reading
Mobile security solutions comparison
By Roxane Suau on May 28, 2020

Workers are undeniably mobile with 80% of corporate tasks to take place on mobile devices in 20201. With 77% of the digital traffic2 coming from...

Continue Reading
Why Updating Mobile OS And Application Is So Important
By Roxane Suau on May 12, 2020

System and application updates always seem to pop up at less than timely moments, and most of us postpone them without second thoughts, for days,...

Continue Reading

Get in touch with mobile security experts

Contact us