Security

2017-09

Lugano 20-21.Sept.2017 – Cybersecurity Symposium – Mobile interception

By |2019-01-15T18:24:06+01:00September 10th, 2017|All posts, Kudelski, Security|Comments Off on Lugano 20-21.Sept.2017 – Cybersecurity Symposium – Mobile interception

We are pleased to invite you to the next Cybersecurity & Management Challenges Symposium Lugano, 20-21 Sept. 2017 www.cmcsymposium.org Businesses and governments are acutely aware [...]

2017-08

Zürich 22 Sept. 2017 – Mobile interception: risks & countermeasures

By |2019-01-15T18:24:06+01:00August 2nd, 2017|All posts, Kudelski, Security|Comments Off on Zürich 22 Sept. 2017 – Mobile interception: risks & countermeasures

Zürich 22 Sept. 2017 Asut Lunch Forum Mobile interception: risks & countermeasures for corporate and government Interception of mobile conversations is something we have all heard about [...]

2017-08

Zürich 22.Sept.2017 – Lunch-Forum “Mobile interception”

By |2019-01-15T18:24:06+01:00August 1st, 2017|All posts, Kudelski, Security|Comments Off on Zürich 22.Sept.2017 – Lunch-Forum “Mobile interception”

We are pleased to invite you to the next Lunch Forum on 22 Sept. 2017 organized by ASUT and sponsored by Tmanco. Guest speakers from Kudelski Security [...]

2017-07

Do-it-yourself sun shade for mobile freedom & privacy

By |2019-01-15T18:24:08+01:00July 26th, 2017|All posts, Consulting, Security|Comments Off on Do-it-yourself sun shade for mobile freedom & privacy

Because work is an activity, not a place ! When we can’t avoid staying online, at least we can make our work pleasant and enjoy the summer. [...]

2017-07

Do-it-yourself Sun Shade for mobile freedom & privacy

By |2019-01-15T18:24:08+01:00July 26th, 2017|All posts, Consulting, Kudelski, Security|Comments Off on Do-it-yourself Sun Shade for mobile freedom & privacy

Because work is an activity, not a place ! When we can’t avoid staying online, at least we can make our work pleasant and enjoy the summer. [...]

2017-06

To BYOD or not to BYOD, a practical guide to estimate your ROI

By |2022-10-05T09:50:29+02:00June 25th, 2017|All posts, Costs, Security, Visibility, Workload|Comments Off on To BYOD or not to BYOD, a practical guide to estimate your ROI

Whitepaper Some studies claim that BYOD will boost productivity, others warn about increasing mobile costs. Our estimates show that a company with 1000 mobiles may see an increase [...]

2017-02

Just How Secure Are Those Encrypted Apps…

By |2019-01-15T18:24:09+01:00February 28th, 2017|All posts, Kudelski, Security|Comments Off on Just How Secure Are Those Encrypted Apps…

An article published in Forbes magazine on Feb. 28th 2017, highlights the flaws in encrypted apps such as Signal, Whatsapp or Telegram. Thanks to its expertise, Kudelski Security [...]

2016-10

How industry meets end-users’ expectations of security, privacy and trust

By |2019-01-15T18:24:10+01:00October 24th, 2016|All posts, Kudelski, Security|Comments Off on How industry meets end-users’ expectations of security, privacy and trust

Re-inforce Security & Privacy over Untrusted Network 1) Over the top approach independent of networks and protocols. 2) Hardware Security Component Based solution scalable to millions. 3) [...]

2015-05

How to intercept mobile communications easily…

By |2019-01-15T18:24:13+01:00May 11th, 2015|All posts, Kudelski, Security|Comments Off on How to intercept mobile communications easily…

An article published by International Institute of Cyber Security on May 11th 2015 describes how easy it can be to intercept mobile communications (calls and messages). If [...]

2015-04

Using private devices for work, yes but…

By |2022-10-05T09:51:29+02:00April 1st, 2015|All posts, Atem, Consulting, Costs, Security, Visibility, Workload|Comments Off on Using private devices for work, yes but…

Before authorizing employees to use their private devices for business purposes, a company should answer several questions related to the financial, security and legal aspects. This article [...]

Go to Top