10 Mobile Security, BYOD Privacy And Security Myths


Email this CRN article

8. Deploying Containers Locks Down Corporate Data

Daniel Brodie, a security researcher at Lacoon Mobile Security presented a paper at Blackhat Europe, which showed how containers can be bypassed using surveillance tools planted on a victim's device. Desktop malware is already using applications and browser components that use containers or sandboxes to expose data. There is no silver bullet for protecting corporate data, according to Bluebox.




Email this CRN article