

Rethinking BYOD: From Legacy Risks to Zero Trust Mobility
In this episode of the Brilliance Security Magazine Podcast, we sit down with Matt Stern, Chief Security Officer at Hypori, to discuss how organizations can move beyond outdated mobile device management strategies and adopt a zero-trust approach to the future. Stern shares compelling insights from his extensive experience in both military and federal cybersecurity, highlighting why traditional BYOD approaches—like MDM and MAM—are no longer adequate. If you're a CISO, IT leader, or just curious about secure mobile innovation, this is a conversation you don’t want to miss.
Summary
The episode begins with Matt Stern’s journey from Army Ranger to cybersecurity executive. He discusses how his experience leading large-scale cyber operations, including the U.S. Army CERT and the EINSTEIN national cybersecurity system, shaped his threat-centric approach to enterprise security.
The conversation then turns to the evolving BYOD (Bring Your Own Device) landscape. Stern highlights the risks posed by traditional mobile device management (MDM) and mobile application management (MAM) solutions—such as increased attack surface, privacy concerns, and inadequate control over unmanaged personal devices. He also touches on regulatory challenges like the “No TikTok Law,” which bans certain apps on government-affiliated devices due to data exposure risks.
Stern explains how Hypori addresses these issues with its Virtual Mobile Infrastructure (VMI), which keeps all data and compute operations off the user’s device. Hypori streams pixels only—meaning no data is stored or processed locally—eliminating risks associated with compromised devices. He walks listeners through Hypori’s layered authentication system and robust security architecture, which enables secure operation from any personal device without compromising user privacy.
The show concludes with a discussion on cost savings and operational efficiency. Stern notes that the Department of Defense already uses over 70,000 Hypori licenses and highlights how organizations can achieve significant savings—up to 42%—by eliminating the need to purchase and manage government-furnished equipment (GFE). His advice to IT leaders: assess your current BYOD risks, examine the real-world behaviors of your workforce, and consider whether legacy models are hindering your security posture.