10 Mobile Security, BYOD Privacy And Security Myths


8. Deploying Containers Locks Down Corporate Data

Daniel Brodie, a security researcher at Lacoon Mobile Security presented a paper at Blackhat Europe, which showed how containers can be bypassed using surveillance tools planted on a victim's device. Desktop malware is already using applications and browser components that use containers or sandboxes to expose data. There is no silver bullet for protecting corporate data, according to Bluebox.