Presentation one: Tablets: A Hard Pill to Swallow
Tablet computers have an increasing presence in today’s enterprise, but at what costs to corporate security? This talk introduced the first of a series of white papers by Context on tablet security, and presented the truth behind the manufacturers’ security claims.
If you would like more information about Context’s mobile device assurance services, visit our dedicated Assurance page
Mobile Device White Paper: Read the full Smartphones in the Enterprise white paper here
Tablet white paper: Read the full Tablets In The Enterprise White paper here
Presentation two: Tablets: Cutting the Blue Wire: Countering Targeted Attacks by Understanding IED Kill Chains
During the conflicts in Afghanistan and Iraq, and throughout the troubles in Northern Ireland, Improvised Explosive Devices (IEDs) have been the weapon of choice for the terrorists and have claimed thousands of lives. In order to counter the threat and track the bomb-makers, these devices are analysed to look for patterns and signatures which link them together and show how the devices could be defeated. This is the ‘Kill Chain’ concept, and Context is applying the same methodology to its work against targeted attacks: analysing all elements of an individual incident to link attacks on different networks and track how the attackers are evolving with the goal of being one step ahead of the bad guys.
If you would like more information about Context’s research into APT or Targeted Attack Detection Service (TADS) service, please go to our dedicated Response area of this website.
APT white paper: Read the full Crouching Tiger, Hidden Dragon, Stolen Data white paper here