<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Whitepapers Archive - Corrata</title>
	<atom:link href="https://corrata.com/whitepapers/feed/" rel="self" type="application/rss+xml" />
	<link>https://corrata.com/whitepapers/</link>
	<description></description>
	<lastBuildDate>Thu, 26 Feb 2026 14:13:40 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://corrata.com/wp-content/uploads/2023/01/cropped-favicon-32x32.png</url>
	<title>Whitepapers Archive - Corrata</title>
	<link>https://corrata.com/whitepapers/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Securing Data in Motion: The  Definitive Guide to Mobile DLP</title>
		<link>https://corrata.com/whitepapers/mobile-dlp/</link>
		
		<dc:creator><![CDATA[Ronan McDonnell]]></dc:creator>
		<pubDate>Thu, 26 Feb 2026 13:57:31 +0000</pubDate>
				<category><![CDATA[Mobile Threat Defense]]></category>
		<guid isPermaLink="false">https://corrata.com/?post_type=whitepapers&#038;p=7675</guid>

					<description><![CDATA[<p>The post <a href="https://corrata.com/whitepapers/mobile-dlp/">Securing Data in Motion: The  Definitive Guide to Mobile DLP</a> appeared first on <a href="https://corrata.com">Corrata</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The post <a href="https://corrata.com/whitepapers/mobile-dlp/">Securing Data in Motion: The  Definitive Guide to Mobile DLP</a> appeared first on <a href="https://corrata.com">Corrata</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>NIS2 Directive Checklist</title>
		<link>https://corrata.com/whitepapers/nis2-directive-checklist/</link>
		
		<dc:creator><![CDATA[Ronan McDonnell]]></dc:creator>
		<pubDate>Wed, 11 Feb 2026 09:25:59 +0000</pubDate>
				<category><![CDATA[Mobile Threat Defense]]></category>
		<guid isPermaLink="false">https://corrata.com/?post_type=whitepapers&#038;p=7659</guid>

					<description><![CDATA[<p>The post <a href="https://corrata.com/whitepapers/nis2-directive-checklist/">NIS2 Directive Checklist</a> appeared first on <a href="https://corrata.com">Corrata</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The post <a href="https://corrata.com/whitepapers/nis2-directive-checklist/">NIS2 Directive Checklist</a> appeared first on <a href="https://corrata.com">Corrata</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>DLP Audit Guide</title>
		<link>https://corrata.com/whitepapers/dlp-audit-guide/</link>
		
		<dc:creator><![CDATA[Ronan McDonnell]]></dc:creator>
		<pubDate>Tue, 03 Feb 2026 16:45:33 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://corrata.com/?post_type=whitepapers&#038;p=7641</guid>

					<description><![CDATA[<p>The post <a href="https://corrata.com/whitepapers/dlp-audit-guide/">DLP Audit Guide</a> appeared first on <a href="https://corrata.com">Corrata</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The post <a href="https://corrata.com/whitepapers/dlp-audit-guide/">DLP Audit Guide</a> appeared first on <a href="https://corrata.com">Corrata</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Dangerous Permissions &#8211; Location Tracking</title>
		<link>https://corrata.com/whitepapers/dangerous-permissions-location-tracking/</link>
		
		<dc:creator><![CDATA[Ronan McDonnell]]></dc:creator>
		<pubDate>Sun, 05 Oct 2025 21:22:42 +0000</pubDate>
				<category><![CDATA[Briefing Notes]]></category>
		<category><![CDATA[Mobile Threat Defense]]></category>
		<guid isPermaLink="false">https://corrata.com/?post_type=whitepapers&#038;p=7287</guid>

					<description><![CDATA[<p>One of the most insidious aspects of the mobile advertising ecosystem is how app vendors exploit end-user trust. Apps that...</p>
<p>The post <a href="https://corrata.com/whitepapers/dangerous-permissions-location-tracking/">Dangerous Permissions &#8211; Location Tracking</a> appeared first on <a href="https://corrata.com">Corrata</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>One of the most insidious aspects of the mobile advertising ecosystem is how app vendors exploit end-user trust. Apps that provide useful services often request a wide range of permissions &#8211; many only loosely connected to the app’s core <br />
function &#8211; in order to harvest detailed data on user behavior. The most egregious example is the monetization of GPS-level location data.</p>
<p>The post <a href="https://corrata.com/whitepapers/dangerous-permissions-location-tracking/">Dangerous Permissions &#8211; Location Tracking</a> appeared first on <a href="https://corrata.com">Corrata</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Living with ECH</title>
		<link>https://corrata.com/whitepapers/living-with-ech/</link>
		
		<dc:creator><![CDATA[Colm Healy]]></dc:creator>
		<pubDate>Wed, 21 May 2025 13:21:13 +0000</pubDate>
				<category><![CDATA[Briefing Notes]]></category>
		<guid isPermaLink="false">https://corrata.com/?post_type=whitepapers&#038;p=7091</guid>

					<description><![CDATA[<p>Read our report on the prospects for adoption of Encrypted Client Hello. </p>
<p>The post <a href="https://corrata.com/whitepapers/living-with-ech/">Living with ECH</a> appeared first on <a href="https://corrata.com">Corrata</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;">Read our report on the prospects for adoption of Encrypted Client Hello. </span></p>
<p>The post <a href="https://corrata.com/whitepapers/living-with-ech/">Living with ECH</a> appeared first on <a href="https://corrata.com">Corrata</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Guide to Mobile Phishing</title>
		<link>https://corrata.com/whitepapers/guide-to-mobile-phishing/</link>
		
		<dc:creator><![CDATA[Colm Healy]]></dc:creator>
		<pubDate>Thu, 15 Jun 2023 15:46:48 +0000</pubDate>
				<category><![CDATA[Briefing Notes]]></category>
		<guid isPermaLink="false">https://corrata.com/?post_type=whitepapers&#038;p=2738</guid>

					<description><![CDATA[<p>The growth in adoption of SaaS means that your organization&#8217;s most critical information is now available on phones and tablets.</p>
<p>The post <a href="https://corrata.com/whitepapers/guide-to-mobile-phishing/">Guide to Mobile Phishing</a> appeared first on <a href="https://corrata.com">Corrata</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The growth in adoption of SaaS means that your organization&#8217;s most critical information is now available on phones and tablets.</p>
<p><img fetchpriority="high" decoding="async" class="alignnone wp-image-3062 size-medium" src="https://corrata.com/wp-content/uploads/2023/06/Cover-of-Mobile-Phishing-Whitepaper-283x400.png" alt="Cover of Mobile Phishing Whitepaper" width="283" height="400" srcset="https://corrata.com/wp-content/uploads/2023/06/Cover-of-Mobile-Phishing-Whitepaper-283x400.png 283w, https://corrata.com/wp-content/uploads/2023/06/Cover-of-Mobile-Phishing-Whitepaper-905x1280.png 905w, https://corrata.com/wp-content/uploads/2023/06/Cover-of-Mobile-Phishing-Whitepaper-768x1086.png 768w, https://corrata.com/wp-content/uploads/2023/06/Cover-of-Mobile-Phishing-Whitepaper-1086x1536.png 1086w, https://corrata.com/wp-content/uploads/2023/06/Cover-of-Mobile-Phishing-Whitepaper.png 1241w" sizes="(max-width: 283px) 100vw, 283px" /></p>
<p>The post <a href="https://corrata.com/whitepapers/guide-to-mobile-phishing/">Guide to Mobile Phishing</a> appeared first on <a href="https://corrata.com">Corrata</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Why Google and Apple’s Malware Protection Might Not Be Good Enough</title>
		<link>https://corrata.com/whitepapers/why-google-and-apples-malware-protection-might-not-be-good-enough/</link>
		
		<dc:creator><![CDATA[Anastasiia]]></dc:creator>
		<pubDate>Tue, 05 Nov 2019 13:11:34 +0000</pubDate>
				<category><![CDATA[Briefing Notes]]></category>
		<guid isPermaLink="false">https://corrata.com/?post_type=whitepapers&#038;p=1413</guid>

					<description><![CDATA[<p>Mobile malware can take many different forms. Spyware, adware, ransomware, and Trojans are commonly hidden in seemingly innocent apps and...</p>
<p>The post <a href="https://corrata.com/whitepapers/why-google-and-apples-malware-protection-might-not-be-good-enough/">Why Google and Apple’s Malware Protection Might Not Be Good Enough</a> appeared first on <a href="https://corrata.com">Corrata</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Mobile malware can take many different forms. Spyware, adware, ransomware, and Trojans are commonly hidden in seemingly innocent apps and communications designed to fool users to take over, damage, and steal information from mobile devices.</p>
<p>The post <a href="https://corrata.com/whitepapers/why-google-and-apples-malware-protection-might-not-be-good-enough/">Why Google and Apple’s Malware Protection Might Not Be Good Enough</a> appeared first on <a href="https://corrata.com">Corrata</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Sideloading from Unofficial App Stores: Despite the Risks, Why Do We Do it?</title>
		<link>https://corrata.com/whitepapers/sideloading-from-unofficial-app-stores-despite-the-risks-why-do-we-do-it/</link>
		
		<dc:creator><![CDATA[Anastasiia]]></dc:creator>
		<pubDate>Tue, 05 Nov 2019 13:09:55 +0000</pubDate>
				<category><![CDATA[Briefing Notes]]></category>
		<guid isPermaLink="false">https://corrata.com/?post_type=whitepapers&#038;p=1415</guid>

					<description><![CDATA[<p>For most smartphone and tablet users, installing an app is a simple and safe process that involves purchasing or downloading...</p>
<p>The post <a href="https://corrata.com/whitepapers/sideloading-from-unofficial-app-stores-despite-the-risks-why-do-we-do-it/">Sideloading from Unofficial App Stores: Despite the Risks, Why Do We Do it?</a> appeared first on <a href="https://corrata.com">Corrata</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>For most smartphone and tablet users, installing an app is a simple and safe process that involves purchasing or downloading a file from the Apple App Store or Google Play Store.</p>
<p>The post <a href="https://corrata.com/whitepapers/sideloading-from-unofficial-app-stores-despite-the-risks-why-do-we-do-it/">Sideloading from Unofficial App Stores: Despite the Risks, Why Do We Do it?</a> appeared first on <a href="https://corrata.com">Corrata</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The rising threat of social media phishing attacks</title>
		<link>https://corrata.com/whitepapers/the-rising-threat-of-social-media-phishing-attacks/</link>
		
		<dc:creator><![CDATA[Anastasiia]]></dc:creator>
		<pubDate>Tue, 05 Nov 2019 13:08:58 +0000</pubDate>
				<category><![CDATA[Briefing Notes]]></category>
		<guid isPermaLink="false">https://corrata.com/?post_type=whitepapers&#038;p=1417</guid>

					<description><![CDATA[<p>Phishing, attempting to fraudulently acquire sensitive personal information from an unsuspecting user, is a well-known cyber threat in today’s digital...</p>
<p>The post <a href="https://corrata.com/whitepapers/the-rising-threat-of-social-media-phishing-attacks/">The rising threat of social media phishing attacks</a> appeared first on <a href="https://corrata.com">Corrata</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Phishing, attempting to fraudulently acquire sensitive personal information from an unsuspecting user, is a well-known cyber threat in today’s digital world.</p>
<p>The post <a href="https://corrata.com/whitepapers/the-rising-threat-of-social-media-phishing-attacks/">The rising threat of social media phishing attacks</a> appeared first on <a href="https://corrata.com">Corrata</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How to protect against an iOS hack</title>
		<link>https://corrata.com/whitepapers/how-to-protect-against-an-ios-hack/</link>
		
		<dc:creator><![CDATA[Anastasiia]]></dc:creator>
		<pubDate>Mon, 02 Sep 2019 13:36:40 +0000</pubDate>
				<category><![CDATA[Briefing Notes]]></category>
		<guid isPermaLink="false">https://corrata.com/?post_type=whitepapers&#038;p=1419</guid>

					<description><![CDATA[<p>Mobile devices have quickly become one of the biggest targets for cyber threats such as phishing and malware attacks. The...</p>
<p>The post <a href="https://corrata.com/whitepapers/how-to-protect-against-an-ios-hack/">How to protect against an iOS hack</a> appeared first on <a href="https://corrata.com">Corrata</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Mobile devices have quickly become one of the biggest targets for cyber threats such as phishing and malware attacks. The rate at which they are used for personal use, as well as business operations, make mobile devices especially vulnerable to attack.</p>
<p>The post <a href="https://corrata.com/whitepapers/how-to-protect-against-an-ios-hack/">How to protect against an iOS hack</a> appeared first on <a href="https://corrata.com">Corrata</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
