October 2012

Presentation one: Tablets: A Hard Pill to Swallow

Tablet computers have an increasing presence in today’s enterprise, but at what costs to corporate security? This talk introduced the first of a series of white papers by Context on tablet security, and presented the truth behind the manufacturers’ security claims.

If you would like more information about Context’s mobile device assurance services, visit our dedicated Assurance page

Mobile Device White Paper: Read the full Smartphones in the Enterprise white paper here

Tablet white paper: Read the full Tablets In The Enterprise White paper here

Presentation two: Tablets: Cutting the Blue Wire: Countering Targeted Attacks by Understanding IED Kill Chains

During the conflicts in Afghanistan and Iraq, and throughout the troubles in Northern Ireland, Improvised Explosive Devices (IEDs) have been the weapon of choice for the terrorists and have claimed thousands of lives. In order to counter the threat and track the bomb-makers, these devices are analysed to look for patterns and signatures which link them together and show how the devices could be defeated. This is the ‘Kill Chain’ concept, and Context is applying the same methodology to its work against targeted attacks: analysing all elements of an individual incident to link attacks on different networks and track how the attackers are evolving with the goal of being one step ahead of the bad guys.

If you would like more information about Context’s research into APT or Targeted Attack Detection Service (TADS) service, please go to our dedicated Response area of this website.

Related Research

APT white paper: Read the full Crouching Tiger, Hidden Dragon, Stolen Data white paper here


© Copyright 2013 Context Information Security