Quokka Introduces Personal Device Management and App Network Filtering Features to Enhance Mobile Security
Learn how Quokka’s new Q-Scout capabilities can benefit your organization’s mobile security strategy.
Learn how Quokka’s new Q-Scout capabilities can benefit your organization’s mobile security strategy.
Mobile security solution transforms BYOD in an enterprise ecosystem, prioritizing the privacy of company and personal data.
In this blog, we focus on the spread of code written by the creators of TikTok throughout App Stores.
Disrupt Tech Co., Ltd is now an authorized distributor of Quokka’s products Q-MAST, Q-Vest, Q-Scout and Firmware Analysis and announces the recent establishment of Quokka’s Q-MAST to Advanced Info Service Public Company Limited (“AIS”), the leading Mobile, Fiber Network and Digital Service Provider in Thailand with more than 40 million subscribers.
Attackers are leveraging AI to craft software that can exploit vulnerabilities in ways never seen before. These sophisticated programs can alter their appearance and processes to slip past traditional detection methods, allowing them to exfiltrate sensitive data undetected.
Next in or series on the app TikTok, we shift our focus from the permissions to the security risks inherent in TikTok and our sample set of apps.
The Federal Government is facing increasing challenges in terms of cybersecurity. To address this, they must modernize and strengthen its infrastructure to protect against cyberthreats and share information between agencies.
Are you worried about threats to your fintech company? Discover the top threats facing the industry and how to overcome them with our expert insights!
Our VP of Program and Product Management, Chris Gogoel focuses on the permissions requested by TikTok, as well as other key takeaways that need attention.
Copyright © 2024, Quokka. All rights reserved.