Quick Look: Mobile Security and the Post-Perimeter World: An Analysis of 10 Years of Mobile Threats


Posted on in Videos

The first decade of widespread use of smartphones and mobile operating systems saw a constant evolution of the attack landscape. Using a decade of data around mobile threats and vulnerabilities, we will show the trends and principles that will drive the direction of the future of risk management, particularly as mobile platforms increasingly operate outside traditional perimeters.

mobile security


Share With Your Community