CYBER 101

  • Alerts
  • Blog
  • Books
  • Certifications
  • Cheat Sheets
  • Courses
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Documents
  • Domains
  • Entertainment
  • FAQ
  • Incidents
  • Quotes
  • Tools
  • Tutorials

Join our newsletter

FOLLOW US

Search

More...

Generic filters
Content from
Content to
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
  • Events
  • Jobs
Get Help
Search

More...

Generic filters
Content from
Content to
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
  • Events
  • Jobs
Get Help
CyberMaterial
No Result
View All Result

“If a managed mobile device gains a new….”

David Jevans

2 min read
in Quotes

 

“If a managed mobile device gains a new configuration profile that was not provided by the enterprise, this may indicate a compromise of the user’s device and, from there, their enterprise credentials. These hostile profiles can be installed on a device through a phishing or spear-phishing attack.” David Jevans – Cryptocurrency Anti-Money Laundering, Financial Investigations and Travel Rule compliance for Banks, Exchanges, DeFi. Hedge Funds, Law Enforcement & Governments.

Source: darkreading 

About David Jevans

Dave Jevans is a founder and CEO of CipherTrace. He is a serial entrepreneur in crypto, security, and Fintech. Mr. Jevans holds 24 U.S. patents, mainly focusing on cybersecurity and cryptography. As an early cypherpunk, he became involved in cryptocurrencies in 1999, closely tracking DigiCash, e-gold, and other early innovators. In 2011, Jevans “went down the rabbit hole,” embracing Bitcoin and tracing criminal activity on the blockchain.

After an early technical leadership career at Apple, Jevans founded his first encryption company, Receipt.com, which went IPO in 2000 after merging with fellow crypto company Valicert. Receipt.com’s secure messaging products continue to underpin global financial networks for banks as well as SWIFT—the de factoinfrastructure for moving value across borders, spanning more than 200 countries.

Jevans went on to found IronKey, a hardware encryption company that continues to thrive in financial, consumer and government markets as a division of Kingston. He then brought mobile security company Marble to market, which is now part of security leader Proofpoint.

Related

Tags: CybersecurityDavid JevansInfosecIOC quotequotes
13
VIEWS
ADVERTISEMENT

Related Posts

“App stores are filled with applications that…”

“App stores are filled with applications that…”

July 22, 2022
“Cybersecurity threats are evolving as…”

“Cybersecurity threats are evolving as…”

July 18, 2022
“Cybersecurity threats are evolving as…”

“Cybersecurity threats are evolving as I speak…”

July 18, 2022
“Startups are incredibly vulnerable to…”

“Startups are incredibly vulnerable to…”

July 18, 2022

More Articles

Book

Security Information and Event Management

March 15, 2022

Contingency plan

March 24, 2021

X Sophos Intercept Tool

March 16, 2021
Quotes

“The first risk is that people…”

December 1, 2020
Alerts

Fortinet security advisory (AV22-184)

April 6, 2022

OrangeTee real estate group suffers data security breach

August 6, 2021

Government-Sponsored / State-Sponsored Actors

February 3, 2021
Alerts

Palo Alto Networks Security Advisory

November 10, 2021
Load More

World’s number one cybersecurity repository. Find everything you need about cybersecurity.

Cybersecurity Domains

  • Application Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • Governance
  • IAM
  • Physical Security
  • More...

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • AR/VR
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • IoT
  • Quantum Computing
  • More...

Frameworks

  • CIS Controls
  • CISA TSS
  • FISMA
  • GDPR
  • ISO 2701/02
  • MITRE ATT&CK
  • NIST
  • NYS-DFS
  • More...

Industries

  • Automation
  • E-Commerce
  • Education
  • Fake News
  • Financial
  • Government
  • Health Care
  • Military
  • More...

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering
  • Vulnerabilities
  • More...

© 2022 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Cyber101
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Attackers
    • Incidents
    • Threats
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Quotes

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.