Mobile Security Report 2018 - Malwares, network attacks...

Posted by Rabah Laouadi on October 31, 2018

We live in an ultra-connected world in which billions of corporate and personal data are manipulated through mobile devices every second. Smartphones and tablets have inherent capabilities that, when illegally exploited, enable hackers to locate users, eavesdrop on their communications, access their files, microphones, camera, etc., making them a target of choice.

Read More

Mobile Threat Defense Guide 2018

Posted by Roxane Suau on October 16, 2018

Our highly digital world has fundamentally changed companies’ organization. Smartphones and tablets are now at the center of our personal and professional usages, with an average of 5 hours per day spent on them. In constant demand of immediacy, the new employee is mobile, flexible and always connected.

Read More

Monetization of mobile applications: Everything about user profiling

Posted by Roxane Suau on October 12, 2018

It is common to observe in films or books a society where citizens are constantly spied on. Even though this  vision is exaggerated, these narratives lead us to put into perspective the concept of confidentiality in our era.

 

Read More

[White Paper] Mobile Banking: Regulations, Threats & Fraud Prevention

Posted by Roxane Suau on October 03, 2018

Mobile banking is a 24/7 remote service offered by banks and financial institutions to their clients. It is delivered through mobile applications and allows to monitor account balances, follow transactions, make fund transfers, etc. 

Read More

C-Executives, IT, sales… Which staff is the most exposed to mobile threats?

Posted by Roxane Suau on September 20, 2018

Nowadays, the vast majority of employees is using smartphones or tablets as part of their work. Those devices, whether they are corporate (COPE) or personal (BYOD), are a gateway to organizations information systems.

Read More