Mobileiron Publishes New Research on Smartwatch Security

Mobileiron Publishes New Research on Smartwatch Security

August 4, 2015 MobileIron Publishes New Research on Smartwatch Security MobileIron Security Experts Presenting at BlackHat and DEF CON LAS VEGAS and MOUNTAIN VIEW, Calif., Aug. 4, 2015 /PRNewswire/ -- MobileIron (NASDAQ: MOBL), the leader in mobile enterprise security, today published research about smartwatch security and how to address data vulnerabilities that may arise when smartwatches are paired with mobile devices connected to enterprise resources such as email and calendars. Smartwatches tested for the report include the Apple Watch, Motorola Moto 360, Samsung Gear 2 Neo, and the Shenzhen Qini U8. Mike Raggo, Director of Security Research at MobileIron, will be available to discuss smartwatch security and the implications for enterprises at the BlackHat and DEF CON conferences in Las Vegas, August 1-9, 2015. See sessions below. He will also host a webinar on September 1 at 10:00 AM PT. Register for the webinar: https://info.mobileiron.com/HowSecureIsYourEnterpriseDataonSmartwatches_regpage.html Download the research: MobileIron Analysis of Smartwatch Security Risks to Enterprise Data "As consumers activate smartwatches and pair them with their smartphones, enterprise data can inadvertently be put at risk," said Mike Raggo, Director of Security Research, MobileIron. "Enterprises should take a critical look at their wearable strategy with a lens towards each device." Who: Mike Raggo, Director of Security Research, MobileIron David Schwartzberg, Senior Security Engineer, MobileIron What & When: "Haking the Next Generation" Wednesday, August 5, 11:00 - 11:55 AM BSides Las Vegas - Common Ground (Florentine G) MobileIron and Veracode Mobile Security Presentation Thursday, August 6, 12:00 - 2:00 PM BlackHat - Slice of Vegas, The Shoppes at Mandalay Place Mobile Data Loss - Threats & Countermeasures Friday, August 7, 11:00 AM - 12:00 PM DEF CON - Wall of Sheep Remaining Covert in an Overt World Friday, August 7, 4:00 - 5:00 PM DEF CON - Wall of Sheep SWATtack - Smartwatch Attack Tool Saturday, August 8, 4:00 - 6:00 PM DEF CON Demo Lab "Haking the Next Generation" Saturday, August 8, 6:00 - 7:00 PM DEF CON - Wall of Sheep Remaining Covert in an Overt World Sunday, August 9, 1:00 - 2:00 PM DEF CON - Skytalk Where: BlackHat Mandalay Bay Convention Center, Las Vegas DEF CON Paris/Bally's, Las Vegas About Mike Raggo Michael Raggo (CISSP, NSA-IAM, ACE, CSI) has over 20 years of security research experience, including deep analysis of threats and countermeasures for enterprise mobility. Michael is the author of "Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols" for Syngress Books and a contributing author to McGraw Hill's "Information Security: The Complete Reference, 2nd Edition." A former security trainer, Michael has briefed the Pentagon and FBI, is a participating member of the PCI Mobile Task Force, and is a frequent presenter at security conferences, including BlackHat, DefCon, DoD Cyber Crime, InfoSec, OWASP, and SANS. About MobileIron MobileIron provides the secure foundation for companies around the world to transform into Mobile First organizations. For more information, please visit www.mobileiron.com. Logo - http://photos.prnewswire.com/prnh/20140923/147891 To view the original version on PR Newswire, visit:http://www.prnewswire.com/news-releases/mobileiron-publishes-new- research-on-smartwatch-security-300122648.html SOURCE MobileIron News Provided by Acquire Media.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    2 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us