Deep brief by Tom Eston of SecureState on security around iOS devices around the release of iOS 5 – updated with content from his talk at 2012 SANS Mobile Device Security Summit.
“IT loves to use Apple iPhones and iPads, but hates supporting them. For most environments, they represent the exception, and are not subject to standard corporate controls. The reason the exception is allowed is usually the fact that the CEO bought an iPhone and iPad the day they were released, and then quickly filled them with sensitive corporate data. With their portability and popularity, it is only a matter of time before one of these devices ends up missing. How worried should you be? This presentation will cover the latest real-world attack techniques for compromising Apple’s iOS devices, introduce a new assessment methodology that can be used by penetration testers, and discuss the latest defensive techniques for securely deploying iOS devices within your enterprise.”
- Mobile Device Management Takes Center Stage at Galaxy S6 Unpacked Event - March 1, 2015
- Dating Apps Could be the Achilles Heel for Bring Your Own Device - February 13, 2015
- From Now On Users Can Legally Unlock Their Mobile Devices - February 12, 2015