Security
How to keep your mobile banking apps secure
As banks operating around the world are showing a lot of interest in offering services at fingertips to their customers, security experts suggest that most of these banking apps are insecure and not that capable to mitigate the evolving threats in the cyber landscape. Although Cybersecurity Insiders hadn’t got an opportunity to audit all these […]
Adding Continuous Security to Your CI Pipeline
This post was originally published here by gregg rodriguez. This is Part 1 of a two-part post on ensuring your applications are secure by adding continuous security to your CI pipeline. Today, more enterprises are looking to public cloud, or Infrastructure-as-a-Service (IaaS), to enable the speed and agility they need in their Continuous Integration (CI) pipeline to stay competitive. […]
Cloud and 5G to boost network security business says Palo Alto
Palo Alto Networks which is known to offer network security solutions has come up with a forecast that cloud and 5G services will boost network security business in upcoming years. James Yu, the country manager of Palo Alto Taiwan revealed the details when announcing the revenues of the company which touched USD $711 million for […]
Securing Azure Virtual Network
This post was originally published here by Edward Smith. Many enterprises are already reaping the exponential rewards delivered by using Infrastructure as a Service (IaaS), in the form of increased efficiency and decreased costs. By combining its reach and scope with the power of virtualization services, such as Azure Virtual Network and Virtual Machines (VMs), Azure is delivering a number of […]
Bitglass Security Spotlight: Apple, Cryptocurrency, and Mass Breaches
This post was originally published here by Will Houcheime. Here are the top cybersecurity stories of recent weeks: Apple app developers advised to reveal and remove screen recording code 60% of cryptocurrency public hacks claimed by two major hacker groups 617 million user accounts placed for sale on dark web South Africa’s main electricity provider experiences data […]
Six Mobile Security threats which need your attention
Every company is worried about mobile security these days as most of the employees of these firms are finding it comfortable to access corporate data from Smartphone’s, tablets and other personal devices. But accessing sensitive data on unsecured devices or devices which lack trust is pushing firms into more trouble as there is always a […]
Email Security Firm Zix acquires Cloud Security firm AppRiver
Dallas based Zix Corp which is into the business of offering email security has officially announced that it is going to acquire cloud security firm AppRiver for $275 million. Zix which is known among healthcare, finance, and government organizations as a solutions provider for BYOD, data loss prevention and email encryption is expected to leverage […]
Huawei 5G Mobile Security risks can be managed says the UK
Britain’s National Cyber Security Center (NCSC) has issued a green signal to the use of 5G technology from the Chinese company Huawei and added in its statement that the mobile security risks involved in using the technology from the company can be managed with precision. Thus, UK becomes the only country to support the innovation […]
Bitglass Security Spotlight: Google, GDPR, & Homeland Security
This post was originally published here by Will Houcheime. Here are the top cybersecurity stories of recent weeks: Google fails GDPR guidelines, fined $57 million U.S. Homeland Security issues hijack warnings Unprotected server exposes four million applications 24 million sensitive banking documents exposed Over 100 million casino bets leaked Google fails GDPR guidelines, fined $57 […]
Google offers Adiantum Mobile Security to entry-level Android smartphones
Google LLC has made it official that it is going to offer Adiantum mobile security to entry-level Android smartphones developed to encrypt data on devices that do not operate on the latest ARMv8 Processors. The objective of the latest offering is to secure devices that are unable to support Advanced Encryption Standard (AES) that are […]