deviceassure

Choose a category below to quickly discover all our device intelligence articles.


deviceassure
Device Security

Firewall Alone Isn’t Enough: The Rise of Spoofed Device Breaches

Web Application Firewalls protect websites from malicious traffic, DDoS attacks and bot activity. However,...

khickey - 11 Jun 2025
3 min read
Device Security

The danger of counterfeit devices on public WiFi networks

Public WiFi is an ubiquitous addition to consumer connection options today and is prevalent in coffee...

Isabel Hughes - 16 Jan 2025
3 min read
Device Security

The downside of user-agent (UA) switchers for online businesses

User-Agent (UA) switchers, software which allow users to change the user-agent string sent by their browser,...

Kevin Hickey - 15 Nov 2024
6 min read
Device Security

Non-authentic devices and enterprise security – a ticking time bomb

Bring Your Own Device (BYOD) policies are becoming more and more prevalent as remote working and connecting...

Isabel Hughes - 22 May 2023
3 min read
Device Security

Why Device Login Emails and 2FA Needs to Improve

The purpose of device login emails is to provide reassurance for users and protection against security...

Isabel Hughes - 19 Jan 2023
7 min read
News & Events

DeviceAssure at the 2019 New York Cyber Security Summit

DeviceAssure was joined by industry leaders, security experts and government reps at the 2019 Cyber Security...

James Kielty - 09 Oct 2019
2 min read
Device Detection

Counterfeit smartphones and the threats they pose

Counterfeit and non-standard devices pose a real threat for business, consumers and regulators. Find...

James Kielty - 22 Feb 2019
4 min read