10/22/2015

Zix’s Hacker Series Continues: David Kennedy on Mobile Devices

by ZixCorp


Regular readers may remember this blog referring to the ease with which hackers can intercept emails being transmitted over unprotected fiber optic cables. I’m now pleased to share with you that David Kennedy, the renowned security expert, has agreed to be interviewed during a live Webinar scheduled for November 11th at 2 p.m. ET. During the interview, I will ask David for his views on the current security levels of mobile devices such as smartphones and tablets. Just how easy is it to compromise mobile devices remotely, or while in the physical possession of hackers? Can operating systems such as iOS and Android resist the current crop of jailbreaking and rooting toolkits? Are Mobile Device Management (MDM), or containerized solutions protected by the remote wipe instruction? David KennedyDavid founded or co-founded several security companies and is one of the originators of the Penetration Testing Execution Standard (PTES), the industry standard for the execution of penetration tests. He’s been a guest on Fox News and CNN, and is a regular speaker at security conferences. Plus he’s the co-author of a best-selling book on penetration testing. It is apt that I will interview David on Veteran’s Day, both of us having served in the military, and I shall hope to have a private chat about his service in the Intelligence Department of the U.S. Marine Corps. However, while we’re live “on-air” I’ll be asking David to describe for us why securing mobility devices – particularly BYOD devices – is so complex, and why securing them is critical for protecting corporate networks and corporate data. While listeners will be able to send in their questions during the webcast, priority will be given to questions submitted in advance. To do this, please tweet your questions to @ZixCorp, comment on our LinkedIn page, or just type your questions into the comments area further down this page. Please register to join David Kennedy and me on November 11th using this link: http://go.zixcorp.com/20151111_Webinar_DavidKennedy.html

Posted: 10/22/2015 12:00:00 AM by Global Administrator | with 0 comments
Filed under: BYOD, device, hacker, mobile, security, series, Webinar


Recent Posts

10/16/2018

New Email Attack Shows How Hackers Can Hijack a Legitimate Email Thread

by Guest Blogger David Bisson

View Blog Post

10/04/2018

Unified Search Is a Seamless Solution for Increasing Regulatory Burden

by David Wagner

View Blog Post

09/26/2018

What the NIST Small Business Cybersecurity Act Means for You

by David Wagner

View Blog Post