Quick Look: Mobile Security and the Post-Perimeter World: An Analysis of 10 Years of Mobile Threats
The first decade of widespread use of smartphones and mobile operating systems saw a constant evolution of the attack landscape. Using a decade of data around mobile threats and vulnerabilities, we will show the trends and principles that will drive the direction of the future of risk management, particularly as mobile platforms increasingly operate outside traditional perimeters.