Why Updating Mobile OS And Application Is So Important

Posted by Roxane Suau on April 29, 2019

System and application updates always seem to pop up at less than timely moments, and most of us postpone them without second thoughts, for days, weeks, months… However, these updates represent an essential piece of systems’ stability and safety, as they include functionality enhancements and patches to security holes.

 

Read More

White Paper | Mobile security for Governments: Threats, real-life cases & adapted security answers

Posted by Roxane Suau on April 18, 2019

The proliferation of mobile devices accessing agency networks, including employees’ personal smartphones and tablets, offers a prosperous playground to hackers.

 

 

Read More

Mobile security event collection for SIEM software

Posted by Roxane Suau on March 21, 2019

Maintaining a safe digital framework can be a tricky task for large organizations’ IT teams. To help them, some solutions such as security information and event management (SIEM) softwares are specifically designed to group and analyze large amounts of data and make them comprehensible at a human scale. By relying on these capabilities, a SIEM can alert on suspicious and potentially illegitimate behaviors, providing security heads with visibility in a security context.

 

Read More

Pradeo wins 5 Awards from the Cybersecurity Excellence Jury

Posted by Roxane Suau on February 26, 2019

The Cybersecurity Excellence jury has released today the names of the best cybersecurity solutions it has awarded in 2019.

We are proud to announce that Pradeo has won the award for mobile security solution of the year, along 4 other prizes for its advanced solutions including Mobile Threat Defense, Mobile Application Security Testing, Runtime Application Self-Protection and GDPR compliance solution.

 

Read More

The network threats that endanger mobile devices privacy

Posted by Roxane Suau on February 14, 2019

Along the massive growth of enterprise mobility, cybercriminals looking for valuable data naturally shifted their interest toward mobile devices. Indeed, smartphones and tablets have inherent capabilities that, when exploited illegally, can provide a direct access to all the data they manipulate. Mobile threats can operate at three different layers of a device: 77% of them use mobile applications, 14% exploit the OS and 9% leverage the network. 

From phishing attempts to the more sophisticated Man-In-The-Middle, this article presents the most common network attacks used to exfiltrate data from mobile devices in the corporate environment.

 

Read More