September 28, 2017 Mobile Stock Trading Apps Vulnerable to Attack 2 min read - Over 20 mobile apps commonly used for stock trading are not very secure, according to recent security research.
Cloud Security March 30, 2017 Do We Need to Worry About Shadow IT? 2 min read - Shadow IT is still a challenge for organizations. Security leaders should provide users with the tools they need and monitor unsanctioned use carefully.
Endpoint September 20, 2016 What I Learned About Smartphone Dependency on a Himalayan Trek 3 min read - As smartphone use skyrockets in India, so does the threat of cyberattacks against Indian government agencies, banks, businesses and individual users.
Endpoint February 18, 2016 Flood of Mobile Apps Poses Growing Security Challenge 2 min read - Mobile apps are being pushed out at a rapid pace, which places a lot of pressure on security teams to develop fast-acting and comprehensive strategies.
November 6, 2015 University Researchers Show How Widely Mobile Apps Share Users’ Personal Information 2 min read - Harvard, MIT and Carnegie Mellon teamed up to show just how much of users' personal information is shared by smartphone applications.
Endpoint September 24, 2015 Mobile Apps: With Friends Like These, Who Needs Enemies? 2 min read - Enterprises need to enact a comprehensive mobile security strategy to safeguard their assets and IPs against malicious mobile apps.
Application Security July 16, 2015 Another 10 Convenient Ways to Increase Your Mobile Application Security Knowledge 4 min read - Enhancing mobile application security doesn't have to take endless time and resources. Catch up on 10 ways you can improve your security knowledge.
Endpoint July 13, 2015 Mobile Malware Threats in 2015: Fraudsters Are Still Two Steps Ahead 4 min read - Mobile malware threats continue to be a major problem for individuals and enterprises alike, and the risks are only getting more severe.
Application Security July 9, 2015 Why Is Digital Piracy Running Rampant, and What Can We Do About It? 4 min read - Digital piracy is growing at a rapid rate due to the modern distribution model, new technologies and mobile applications, increasing the need for security.
Endpoint June 25, 2015 Take Your Mobile Security to the Next Level 5 min read - Enterprises today are embracing mobile technologies and the bring-your-own-device movement, but that means they must develop mobile security strategies.