#1 Way to Reduce Mobile Fraud (That You...
Traditional approaches for fraud prevention rely heavily on user, account, and transaction data. But for transactions that originate from a mobile app, very little is known about the health of the mobile device. This is the most important cause of mobile fraud… one that is a growing problem considering that a significant amount of mobile fraud occurs on the device via malware, bots, and emulators. The only way to combat these sophistic...
Edge Computing – A Must for 5G and IOT...
As the federal government evolves into the “new normal” as a result of COVID-19, Federal data architectures have changed to adapt. Edge computing, alongside 5G and IOT, has created the opportunity for more efficient decisioning at the point of events. Data can be analyzed at near real-time speeds, accelerating decisions that impact critical missions and improve government operations. By collecting and processing data closer to the...
May 20, 2021
Organizer:
ATARC Location:
Webcast
From Telemedicine to O365, Protecting H...
For years, healthcare organizations have been using mobile devices to enable productivity and improve patient care. With the pandemic, mobile devices have become even more critical for everything from telemedicine to providing distributed access to Microsoft O365. But the shift to mobile has also created security and compliance risks that need to be addressed. Please join experts from VMware and Zimperium as they outline: The top threats that...
Why Are Many Zero Trust Efforts Only 40...
The distributed workforce has changed the face of enterprise security, bringing enhanced access controls like Zero Trust to the forefront, enabling employees to be productive anywhere in the world. For enterprises to truly implement the ‘always verify, never trust’ model of Zero Trust architecture, they must gather accurate telemetry data from all endpoints, including mobile, and address major gaps in enterprise security and data a...
Malicious Apps are Attacking Your Mobil...
Mobile is now the most important digital channel for your business. Yet everyday we hear of another app breach that exposed PII, enabled fraud or put the enterprise system at risk. The main culprit is mobile malware. Anubis, Cerberus, Blackrock, Eventbot and the list goes on and on. The result, fraud, data theft, reputation damage or financial losses. Whether it's by abusing permissions, impersonating brands or exploiting vulnerabilities, malw...
Zimperium- Join us as we discuss how to...
Join us as we discuss how to Defend Your Mobile Devices from O365 Attacks Thursday, April 8, 2021 12:00:00 PM CDT - 1:00:00 PM CDT Microsoft Office 365 has been the primary enterprise productivity suite for years, starting on traditional endpoints and moving to mobile devices. Then came the pandemic-driven tectonic shift to remote working. Making the Office suite - from Outlook to Teams - a requirement for mobile devices. But it also created...
Securing the Remote Workforce – A Movin...
When the first lockdown orders in response to the COVID-19 pandemic were issued in March 2020, many agencies at all levels of government had to scramble to accommodate large numbers of their workers suddenly teleworking. The importance of implementing securing zero-trust security methodology (or architecture)– maintaining strict access controls and not trusting any user automatically, whether inside or outside the network perimeter ...
April 1, 2021
Organizer:
FEDINSIDER Location:
Webcast
Zimperium Special Analysis: Unsecured C...
As has been widely reported, Zimperium has discovered thousands of mobile apps with unsecured cloud storage configurations. In apps around the world and in almost every category, our analysis revealed a number of significant issues that: Exposed PII; Enabled fraud; and/or Exposed IP or internal systems and configurations. If you are responsible for mobile app development or security, please join our experts for an indepth look at the threat, i...
Government’s Strategic Roadmap to Edge...
IDC defines edge computing as processing that is done at or near the source of government data, which secures and reduces data transport time as well as network traffic. Growing adoption of Internet of Things (IoT) tools such as traffic sensors, security cameras, and building security devices is creating 95% of the growth in network traffic. The value of edge computing spans an ever-widening number of missions. For example, adding data analyti...
March 18, 2021
Organizer:
FEDINSIDER Location:
Webcast
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.