Description: Synopsis
“Last years, we have been observing a market expansion on compliance, guidelines and best practices besides of technical solutions on mobile security like MDM or something. However, MDM is out control for BYOD there and makes room for MAM. MAM is still hidden part of MDM and focuses on application management. MAM comes to rule the mobile world when MDM is not capable to provide granular control over BYOD and totally based configurations settings, APIs, permissions, firmware and application data, access control, tracking, etc. Talk shows how companies and individuals could be victims and why technical solutions liable for the consequences in the first place if you are not ready to MAM.”
Bio
Yury Chemerkin started as a reverser and security developer and continued to gain experience on malware and mobile security. Last years he has been researching Mobile and Cloud solutions (and IAM solutions in general) for exploitation from different viewpoints (incl. forensics) based on misunderstood security principles and developing as a distributed spyware infrastructure. Now he is a multi-skilled security expert on security & compliance and mainly focused on privacy and leakage showdown.
For More Information please visit : - http://www.notacon.org
http://www.irongeek.com/i.php?page=videos/notacon11/mainlist
Tags:
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.