Data Protection October 26, 2018 How to Secure Mobile Messaging in Your Enterprise 3 min read - Two decades ago, AOL's Instant Messenger changed the way we communicate. Today, mobile messaging is more popular than ever — but not much more secure.
Data Protection October 3, 2018 The Wild West of Data Risk Management in the Age of Cloud, Mobile and Digital Transformation 3 min read - In today's rapidly evolving security environment, it's imperative for organizations to establish a formal data risk management program that does more than just check the boxes.
Application Security September 26, 2018 Maximize the Power of Your Open Source Application Security Testing 3 min read - To secure products that use open source components, organizations must first take stock of how much of this code they are using in their products.
Application Security September 25, 2018 Your Web Applications Are More Vulnerable Than You Think 3 min read - A recent study from Positive Technologies shined a light on an attack vector that is often overlooked: the insecurity of web applications.
Endpoint September 25, 2018 Which Mobile Threats Do You Need to Prepare For? 2 min read - As the workforce has embraced digital transformation, the volume and frequency of mobile threats has skyrocketed. Which threats should your organization be worried about?
Security Services August 21, 2018 Why, When and How Often Should You Pen Test? 3 min read - A pen test can help organizations identify vulnerabilities in their systems and software before threat actors have a chance to exploit them.
August 17, 2018 Mobile App Security Threat Forces Google Play Store to Remove 145 Android Apps 2 min read - Google pulled 145 Android apps from its Play Store after Palo Alto Networks discovered that they were infected with Windows malware, posing a mobile app security threat to the software ecosystem.
Application Security August 7, 2018 How to Manage App Security Amid Expanding Shadow IT 3 min read - Protecting endpoint-generated data is the name of the game in cybersecurity today. However, increasing shares of shadow IT devices in the workplace are making app security a more significant challenge.
Cloud Security August 3, 2018 An In-Depth Guide to Application Modernization and Cloud Security 7 min read - Security remains the primary concern for many CIOs in adopting hybrid IT and cloud technologies as they pursue application modernization.
August 1, 2018 Fake Android Banking Apps Leak Credit Card Details Online 2 min read - In July 2018, Researches reported three fake Android banking apps that phished for users' credit card details and leaked them online by transferring them to an exposed server.