10 Mobile Security, BYOD Privacy And Security Myths


8. Deploying Containers Locks Down Corporate Data

Daniel Brodie, a security researcher at Lacoon Mobile Security presented a paper at Blackhat Europe, which showed how containers can be bypassed using surveillance tools planted on a victim's device. Desktop malware is already using applications and browser components that use containers or sandboxes to expose data. There is no silver bullet for protecting corporate data, according to Bluebox.



Next Page