Mobile Security
Attorney-Client Privilege at the Border
A recent case has interesting implications for the privacy of attorney-client privileged information at the border ...
A Practical Guide to OWASP MASVS v2.0 – Its Evolution and Implementation
What is OWASP MASVS? The OWASP (Open Worldwide Application Security Project) MASVS (Mobile Application Security Verification Standard) is a valuable resource for mobile app developers seeking to improve the security posture of ...
Addressing the Mobile Malware Threat With Zero-Trust
AI-enabled zero-trust solutions can help address the rising threat of mobile malware ...
Advanced Endpoint Protection (AEP): What Are the Options?
Advanced endpoint protection, often referred to as AEP, is a comprehensive cybersecurity solution designed to protect an organization’s endpoints, such as desktops, laptops and mobile devices, from various types of cybersecurity threats ...
How Mobile Device Management Helps in Unified Management of Endpoints
The extensive use of mobile devices for corporate-related tasks has revolutionized work models, with hybrid approaches dominating the business landscape.Read More The post How Mobile Device Management Helps in Unified Management of ...
How Mobile Device Management Helps in Unified Management of Endpoints
The extensive use of mobile devices for corporate-related tasks has revolutionized work models, with hybrid approaches dominating the business landscape.Read More The post How Mobile Device Management Helps in Unified Management of ...
Mobile App Testing: Top-notch Security
Introduction Our daily lives have become completely dependent on mobile applications. To ensure secure mobile app testing, top-notch security is necessary. This makes a variety of chores easier and is always at ...
5G and Cybersecurity Risks in 2023
The rollout of 5G networks has been surprisingly slow. As a concept, it was introduced in 2016, but it only became globally available in 2019. Four years later, the number of people ...
Phishing Attacks Target BYOD Through Private Messaging Apps
Employees’ personal devices pose a threat to organizations as bring-your-own-device (BYOD) policies cause security headaches for IT professionals, according to a SlashNext survey of 300 tech workers and employers. The study revealed ...
Zero-Trust Alone Proves Inadequate for Securing APIs
The disclosure of three significant API security incidents in the first two months of 2023 serves as a reminder that, as the use of APIs continue to rise, so too does the ...