The CSO Conference & Awards: A Brief History
Blockchain Technology: From Hype to The Future
Tools to Meet Tomorrow’s Mobile Cybersecurity Threats for Government
Account Takeover Fraud: Navigating the Treacherous Digital Waters
The Importance of Jailbreaks for iOS Security Work
{Latest Posts}
Switching to a Safer Mobile Security Solution is Critical for B2B Security
In today’s digital world, businesses are becoming more and more dependent on mobile devices to conduct their operations. From communication and data transfer to managing customer relationships and transactions, mobile technology is rapidly becoming the
Why CISOs Should Embrace Personalized Cybersecurity Training
One of the most urgent responsibilities for any CISO is generating support for Cybersecurity Awareness Training (CSAT) across the organization. An effective cybersecurity strategy requires comprehensive stakeholder buy-in, as data breaches can be caused by
Considerations for Optimizing Patient-Provider Messaging Systems
Major advancements in technology over the past couple of decades have completely altered the way in which we communicate as a society. Today, we expect all our communications to be fast, simple, and easy to
Virtualization Is Transforming Mobile Security Research: Here’s How
The Internet of Things (IoT) is taking mobile security research by storm. According to market research firm Statista, the number of IoT devices worldwide is forecast to include more than 29 billion IoT devices by
Pirated Software Presents New Cybersecurity Risks for Small-Business Owners
Although using unlicensed or pirated business software is illegal, many companies still get away with it. According to the latest Global Software Survey conducted by the Business Software Alliance (BSA), approximately 37% of all software
Combating Identity Theft in the U.S. in 2023: 5 New Strategies
Cybersecurity is more critical than ever. Over 5 billion people use the internet daily, so strong protection is necessary to keep them safe, especially from identity theft. Security experts coined identity theft in the 1960s
Accounting for Cybersecurity Risks in the U.S. Transport Industry
The world has become increasingly interconnected through technology. Many countries rely on their transportation systems to deliver goods domestically and overseas. Cybercriminals understand the necessity and exploit it for their gain. The past few years
3 Mobile Security Testing Challenges and How to Overcome Them
Mobile security testing, as any pentester or vulnerability researcher can tell you, is full of time-consuming and tedious tasks, like sourcing and jailbreaking physical devices. But time and headaches aren’t the only issue.