Tablet computers have an increasing presence in today’s enterprise, but at what costs to corporate security? This talk introduced the first of a series of white papers by Context on tablet security, and presented the truth behind the manufacturers’ security claims.
If you would like more information about Context’s mobile device assurance services, visit our dedicated Assurance page
During the conflicts in Afghanistan and Iraq, and throughout the troubles in Northern Ireland, Improvised Explosive Devices (IEDs) have been the weapon of choice for the terrorists and have claimed thousands of lives. In order to counter the threat and track the bomb-makers, these devices are analysed to look for patterns and signatures which link them together and show how the devices could be defeated. This is the ‘Kill Chain’ concept, and Context is applying the same methodology to its work against targeted attacks: analysing all elements of an individual incident to link attacks on different networks and track how the attackers are evolving with the goal of being one step ahead of the bad guys.
If you would like more information about Context’s research into APT or Targeted Attack Detection Service (TADS) service, please go to our dedicated Response area of this website.