Whitepapers
Read a selection of whitepapers and briefing notes for in-depth coverage of key topics in mobile endpoint security.

Featured Whitepaper
Living with ECH Read our report on the prospects for adoption of Encrypted Client Hello.
Download -
reading time: 10 min
Public Wi-Fi: Stealing Secrets in the Sky
‘Free Wi-Fi’ - how secure is it? Learn the differences between open and closed Wi-Fi connections and how to keep...Download -
reading time: 10 min
Machine Learning: a New Frontier in Mobile Phishing Protection
An examination of 'Zero-day' phishing attacks, the capabilities of machine learning, and Corrata's technical solution.Download -
reading time: 10 min
3 Key Developments in Mobile Phishing That Every Organization Should Know
Phishing attacks are becoming more common and more difficult to spot. Understanding the evolving strategies of cyber criminals is crucial...Download -
reading time: 10 min
Understanding Alternative Approaches to Device Security
Threats against mobile devices are increasing, putting companies' sensitive information at risk. Understand the pro's and con's of Mobile Threat...Download -
reading time: 10 min
DNS over HTTPS – Anti-Phishing Solutions are going Dark
A breakdown of DNS Sniffing and how this solution to phishing will be affected by decisions to encrypt DNS traffic.Download -
reading time: 10 min
Today’s Mobile Threat Landscape
Much has changed in enterprise mobility since the launch of the iPhone ten years ago. Among other things, we've seen...Read more