All resources sponsored by:

Zimperium

6 Matches
Major Media And Technology Firm Boosts Security Across Its Apps And Devices
sponsored by Zimperium
CASE STUDY:Read this case study to learn how Zimperium solutions enabled a large media and technology company fortify and actively protect a diverse content delivery infrastructure against hackers and other bad actors seeking to disrupt their business, steal content, and obtain private information.
Posted: 11 Nov 2021 | Published: 11 Nov 2021
Get This Now

TOPICS:  .NET

Zimperium Video
sponsored by Zimperium
WEBCAST:In this webinar, security experts from Zimperium will break down the history of Pegasus and its use as an espionage tool, give an overview of how Pegasus operates and explain how to protect your enterprise mobile endpoints from Pegasus and other spyware.
Posted: 10 Nov 2021 | Premiered: Nov 10, 2021
Get This Now

TOPICS:  .NET

Top 7 Source Code Obfuscation Techniques
sponsored by Zimperium
WHITE PAPER:In Zimperium's Top 7 Source Code Obfuscation Techniques report, they review how obfuscation in programming works and the top obfuscation security techniques used by mobile app developers around the world. Read on to learn more.
Posted: 09 Nov 2021 | Published: 09 Nov 2021
Get This Now

TOPICS:  .NET

How To Leverage O365 For A Zero Trust Strategy
sponsored by Zimperium
WHITE PAPER:Enterprise adoption of Microsoft Office 365 (O365) skyrocketed to over 258 million users in 2020 and continues to climb into 2021. In this report, Zimperium explains how to combine the power of O365 with advanced mobile security for enhanced zero-trust architecture. Read on to get started.
Posted: 09 Nov 2021 | Published: 09 Nov 2021
Get This Now

TOPICS:  .NET

Ultimate Mobile App Security Guide
sponsored by Zimperium
RESOURCE:Most companies with an online presence deploy an app – for many, it’s their core business driver. However, businesses aren’t alone in recognizing the revenue potential of mobile apps, cybercriminals have as well. Read ‘The Ultimate Mobile App Security Guide’ to learn how to thwart these criminals.
Posted: 08 Nov 2021 | Published: 08 Nov 2021
Get This Now

TOPICS:  .NET

The Anatomy Of Mobile Attacks
sponsored by Zimperium
WHITE PAPER:With the same level of access as laptops but far less security, mobile devices have become a lucrative vector for cybercriminals. Download this white paper for a breakdown of the anatomy of common mobile attacks, an overview of the Cyber Kill Chain (CKC) Model, and MITRE ATT&CK’s tactics for protecting mobile devices.
Posted: 13 Jul 2021 | Published: 13 Jul 2021
Get This Now

TOPICS:  Cybersecurity

6 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2022, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences