Mobile security: How to secure enterprise mobility

Posted by Luc Pinto-Capelle on May 27, 2019

The Unified Endpoint Management (UEM) model has known a steady growth in its popularity, taking further the management capacities of the Enterprise Mobility Management (EMM) by including not only the company’s mobile devices but also the laptops and desktops devices within the same solution. The UEM solution allows for increased efficiency, more cost-effectiveness and a better mobile security within an organization, this last point being further improvable through the adjunction of a mobile security solution such as a Mobile Threat Defense (MTD) solution.

 

Read More

SMS OTP Authentication: Not As Safe As You May Think

Posted by Roxane Suau on May 21, 2019

Most online transactions require a two-step authentication, and the One-Time-Password (OTP) sent by SMS is often one of those two steps. The purpose of an OTP is to prevent fraud by confirming that the person making the transaction and the credit card owner are one and the same. To do so, a temporary code is automatically sent by SMS to the phone number associated with the bank account used.

 

Read More

Monetization of mobile applications: Everything about user profiling

Posted by Roxane Suau on May 06, 2019

It is common to observe in films or books a society where citizens are constantly spied on. Even though this  vision is exaggerated, these narratives lead us to put into perspective the concept of confidentiality in our era.

 

Read More

Why Updating Mobile OS And Application Is So Important

Posted by Roxane Suau on April 29, 2019

System and application updates always seem to pop up at less than timely moments, and most of us postpone them without second thoughts, for days, weeks, months… However, these updates represent an essential piece of systems’ stability and safety, as they include functionality enhancements and patches to security holes.

 

Read More

Mobile security event collection for SIEM software

Posted by Roxane Suau on March 21, 2019

Maintaining a safe digital framework can be a tricky task for large organizations’ IT teams. To help them, some solutions such as security information and event management (SIEM) softwares are specifically designed to group and analyze large amounts of data and make them comprehensible at a human scale. By relying on these capabilities, a SIEM can alert on suspicious and potentially illegitimate behaviors, providing security heads with visibility in a security context.

 

Read More