The post-perimeter world
Mobile has emerged as a key component of the Advanced Persistent Threat arsenal. These "mAPTs" take advantage of the smartphone's features and capabilities and turn it into the ideal weapon for cyber espionage. Mobile phishing, remote and silent jailbreaks, spywares, network attacks and other sophisticated, targeted, and persistent mobile attacks are the components of the most underrated cyber-security threat nowadays. During our session, we will explain why any data protection strategy MUST include mobile security.