Remove page g
article thumbnail

You want me to do what?!? A mobile strategy challenge!

A Screw's Loose

I spent the whole presentation on Securing the Mobile Enterprise building up to the the fact that most businesses were approaching mobile strategy using legacy thinking and now was the time to get out of the habit. We look to secure every device and every endpoint. Security makes sure we encrypt our laptops. We manage devices.

Mobile 78
article thumbnail

The Hacker Mind Podcast: Gaining Persistence On Windows Boxes

ForAllSecure

Estimates vary greatly, with some security vendors claiming dwell time is as low as 11 days with ransomware while others claim dwell time can be as high as 200 days or more with more sophisticated attacks. These APTs have somehow found a way to bypass most security tools, hence their persistence. And secure Academy.

Windows 40