Blog

The latest industry news in cybersecurity’s ever-evolving landscape.

BYOD Healthcare: Policies, Drawbacks and Security Solutions

BYOD Healthcare: Policies, Drawbacks and Security Solutions

Within the healthcare sector in particular, secure BYOD frameworks are necessary to maintain compliance. We're sharing the challenges and solutions you should consider when building, maintaining, or updating your BYOD policy.
Read More
Keep Your Organization and Employees Secure Without the Need for Mobile Device Management

Keep Your Organization and Employees Secure Without the Need for Mobile Device Management

Significant deployment and adoption challenges have lead many organizations to seek out Mobile Device Management (MDM) alternatives for their data security requirements.
Read More
How to Make BYOD Successful and Secure in a Hybrid Workplace

How to Make BYOD Successful and Secure in a Hybrid Workplace

We're sharing five key areas that should be cornerstones for a successful and secure BYOD in a hybrid workplace.
Read More
.io VS .com: What's in a Domain Name?

.io VS .com: What’s in a Domain Name?

Choosing a top-level domain (TLD), which is everything that follows the final dot of a domain name, has become more complicated than just adding .com to your URL.
Read More
Introducing Q-Scout

Introducing Q-Scout

At Quokka, we believe personal privacy and mobile security should live in harmony. And we’re making it happen with Q-Scout. Our Q-Scout solution provides intelligent, proactive security to safeguard you, your company and all of its employees, with privacy at its core.
Read More
Becoming Quokka

Becoming Quokka

Today, I’m excited to reveal our new company name—Quokka—and share with you the reason behind the name and how we put proactive privacy protection at the forefront of what we do.
Read More
The Understated Risk of Apple's Newly Discovered Security Flaws

The Understated Risk of Apple’s Newly Discovered Security Flaws

Over the past few days, Apple users were advised to urgently update the vast majority of iOS, IPadOS, and MacOS devices due to the discovery of two security flaws. Here's what you need to know.
Read More
Disabling Arbitrary App Components Vulnerability in AOSP

Disabling Arbitrary App Components Vulnerability in AOSP

Critical security vulnerabilities and privacy issues have been identified in vSIM technology from Simo. Read more about our findings here.
Read More
The Importance of Phone Software Updates and Tips to Keep you Safe

The Importance of Phone Software Updates and Tips to Keep you Safe

In this blog we're sharing why software updates are important and best practices to keep your mobile device safe.
Read More

Newsletter

Subscribe today for news, updates, and insights for your work and live anywhere world.