Many businesses are looking to containerisation to solve their BYOD or COPE security concerns, but it’s not as effective at stopping mobile threats as you might think.
We’re pleased to announce the launch of Personal Privacy Mode – an optional setting that returns only the compliance state of the device, and nothing else.
A summary of the main features of the Android and iOS Traced apps.
It’s a problem in the industry that infuriates me – large cybersecurity companies apply the same threat model to all platforms.
For those who want to dig a little deeper into their organisation’s mobile threats, Traced CTO Matt Boddy demonstrates hunting for the Cerberus banking Trojan, using Traced Control.
The human-actionable defences against phishing that we take for granted on a desktop aren’t available on a mobile.
In this short video, Ben demonstrates a MitM attack via a local coffee shop WiFi.