Blog
Read our blog to get expert insights into the most pressing issues in mobile security including the latest threats and how to counter them.
Filter by:
-
May 25, 2023 · 15 min read
Making Your Case
The growth of SaaS and Cloud computing means the case for mobile endpoint security is clear As a CISO, Security…
-
May 10, 2023 · 15 min read
Popular Websites Failing To Protect Data Uploaded By Customers
Corrata has recently uncovered multiple cases of popular websites failing to encrypt data uploaded by customers. Last year we reported that poor…
-
Apr 3, 2023 · 5 min read
Pegasus, Predator, Hermit Spyware – NSO and its clones
Recent revelations point to the proliferation of sophisticated cyber-surveillance tools targeting iOS and Android devices. The recent revelation that the…
-
Feb 16, 2023 · 15 min read
Don’t Get Undone By The Wrongs Of Others
Why well-implemented Transport Layer Security is critical to enterprise security in the cloud era The era when the vast majority…
-
Jan 25, 2023 · 15 min read
Courts, Contracts, Cloud And Collaboration
How to respond to the step change in mobile risk across the legal profession As an IT leader in a…
-
Jan 10, 2023 · 15 min read
2023 – The Year Ahead
Some, perhaps, below the radar, changes in the mobile landscape in 2023 It’s the start of a new year, and…
-
Dec 19, 2022 · 15 min read
2022 – The Year in Review
Our thoughts on an eventful year in mobile security 2022 has been an eventful year in mobile security. Continued concerns…
-
Dec 5, 2022 · 15 min read
Corrata Named Technology Leader
Dublin, 2 December 2022, Corrata, the award-winning mobile threat defense solution provider, is delighted to announce that Quadrant Knowledge Solutions…
-
-
Nov 14, 2022 · 15 min read
Five Deadly Sins
The privacy pitfalls to avoid when choosing a mobile threat defense solution In our experience, mobile is almost always used…
-
Oct 26, 2022 · 15 min read
Unprotected Text
Why you need the protection against smishing that only a specialist can provide The recent attacks against Twilio and Cloudflare…
-
Oct 18, 2022 · 5 min read
MFA Bypass – Stealing Cookies
How Adversary-in-the-Middle attacks are undermining multi-factor authentication According to Verizon’s authoritative Data Breach Investigation Report, 90% of data breaches start…