The first decade of widespread use of smartphones and mobile operating systems saw a constant evolution of the attack landscape. Using a decade of data around mobile threats and vulnerabilities, we will show the trends and principles that will drive the direction of the future of risk management, particularly as mobile platforms increasingly operate outside traditional perimeters.