Data Protection January 26, 2015 Securing Mobile Banking Apps: You Are Only as Strong as Your Weakest Link 6 min read - The consequences of cybercrime are well understood. What is not so well understood is how to prevent these attacks, especially in mobile banking apps.
CISO December 17, 2014 Security Technology a Top Focus for CISOs 2 min read - Security leaders are focusing their attention on improving security technology in the face of innovations in the cloud, mobile devices and big data.
Application Security December 12, 2014 The State of Security for Mobile Applications 3 min read - The "State of Mobile App Security" discusses security trends and threats facing mobile applications and what organizations can do to mitigate them.
Intelligence & Analytics December 2, 2014 High-Priority Security Principles: Focus on Employees 3 min read - An organization's employees need to be taught proper security principles in order to play their role in keeping the enterprise safe from threats.
November 21, 2014 NotCompatible Mobile Malware Takes Aim at Android Devices 2 min read - Researchers say a botnet-for-rent known as NotCompatible has been improved and is becoming one of the worst mobile malware threats to target Android.
November 11, 2014 Masque Attack Switches iOS Apps With Malicious Duplicates 2 min read - The so-called Masque attack lures iPhone users to update their favorite apps, then replaces those apps with identical but malicious imitators.
November 10, 2014 WireLurker iOS Trojan May Be Apple’s Worst Nightmare 2 min read - A Trojan that security researchers have dubbed WireLurker infects Macs running OS X and then steals information on iOS devices after connecting via USB.
Intelligence & Analytics November 7, 2014 Identity Management in the Brave New World of Social, Mobile and the Cloud 2 min read - The modern identity management ecosystem must be properly managed as companies increasingly adopt the cloud to access secure data.
CISO November 3, 2014 Remote Wiping of Mobile Devices and Implications for Incident Response 3 min read - Lessons learned for incident response from criminals remotely wiping mobile devices seized by U.K. police.
Fraud Protection September 11, 2014 Emerging Trends in Money Mules Schemes 3 min read - As new technologies and services emerge, money mules and criminal organizations will adapt their tactics to exploit the updated systems.