A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Subscribestar or Patreon

Search Irongeek.com:

Affiliates:
Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


MDM is gone, MAM is come. New Challenges on mobile security - Yury Chemerkin Notacon 11 (Hacking Illustrated Series InfoSec Tutorial Videos)

MDM is gone, MAM is come. New Challenges on mobile security
Yury Chemerkin
Notacon 11

Synopsis
“Last years, we have been observing a market expansion on compliance, guidelines and best practices besides of technical solutions on mobile security like MDM or something. However, MDM is out control for BYOD there and makes room for MAM. MAM is still hidden part of MDM and focuses on application management. MAM comes to rule the mobile world when MDM is not capable to provide granular control over BYOD and totally based configurations settings, APIs, permissions, firmware and application data, access control, tracking, etc. Talk shows how companies and individuals could be victims and why technical solutions liable for the consequences in the first place if you are not ready to MAM.”

Bio
Yury Chemerkin started as a reverser and security developer and continued to gain experience on malware and mobile security. Last years he has been researching Mobile and Cloud solutions (and IAM solutions in general) for exploitation from different viewpoints (incl. forensics) based on misunderstood security principles and developing as a distributed spyware infrastructure. Now he is a multi-skilled security expert on security & compliance and mainly focused on privacy and leakage showdown.

Back to Notacon 11 video list

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast