deviceassure
Choose a category below to quickly discover all our device intelligence articles.
Firewall Alone Isn’t Enough: The Rise of Spoofed Device Breaches
Web Application Firewalls protect websites from malicious traffic, DDoS attacks and bot activity. However,...
The danger of counterfeit devices on public WiFi networks
Public WiFi is an ubiquitous addition to consumer connection options today and is prevalent in coffee...
The downside of user-agent (UA) switchers for online businesses
User-Agent (UA) switchers, software which allow users to change the user-agent string sent by their browser,...
Non-authentic devices and enterprise security – a ticking time bomb
Bring Your Own Device (BYOD) policies are becoming more and more prevalent as remote working and connecting...
Why Device Login Emails and 2FA Needs to Improve
The purpose of device login emails is to provide reassurance for users and protection against security...
DeviceAssure at the 2019 New York Cyber Security Summit
DeviceAssure was joined by industry leaders, security experts and government reps at the 2019 Cyber Security...
Counterfeit smartphones and the threats they pose
Counterfeit and non-standard devices pose a real threat for business, consumers and regulators. Find...