Security Boulevard’s 5 Most Read Stories for the Week, June 11-15

A new week, a new crop of security stories. Last week, mobile security behaviors, mobile device exploits, Trojan MysterBot and HR’s data protection problems made the headlines. In addition, we offered insights on finding the next generation of cybersecurity talent.

Next Generation of Cybersecurity Talent

Top 4 Ways to Find the Next Generation of Cybersecurity Talent

The talent shortage in cybersecurity is a well-known and well-discussed problem. There are more jobs in cybersecurity than there are qualified employees to fill them. This problem is compounded by the fact that many current cybersecurity positions require hands-on experience, leading many organizations to compete for seasoned security professionals rather ...

Mobile security advances to stopping device exploits — not just detecting malicious apps

The most profound threat to corporate networks isn’t the latest, greatest malware. It’s carbon-based life forms. Humans tend to be gullible and impatient. With our affiliations and preferences put in play by search engines and social media, we’re perfect patsies for social engineering. And because we are slaves to convenience, ...
How the PageUp Hack is Highlighting HR's Data Protection Problems

How the PageUp Hack is Highlighting HR’s Data Protection Problems

The recent data breach at global Human Resources services provider PageUp may have impacted millions of job seekers. The Authentic8 Blog highlights how the PageUp hack is symptomatic for HR's cybersecuity problem ...
Multipurpose Trojan MysteryBot Targets Android Devices

Multipurpose Trojan MysteryBot Targets Android Devices

Cybercriminals have a new Android malware program in their toolbox called MysteryBot that can serve multiple purposes: banking Trojan, keylogger and ransomware.The Trojan was identified by researchers from threat intelligence firm ThreatFabric and seems to be related to the LokiBot Android banking trojan—possibly even created by the same authors.Recent Articles ...
How To Change Security Behaviors: Mobile Security

How To Change Security Behaviors: Mobile Security

| | Mobile
Let’s be honest, security has never been simple ...
You may also like

Be sure to check Security Boulevard daily for the latest in security news, updates and features worth noting.

Featured eBook
The Complete Guide on Open Source Security

The Complete Guide on Open Source Security

This joint report by Microsoft and WhiteSource discusses the difference in finding & fixing vulnerabilities in open source components opposed to proprietary code, how to grasp the unique challenges of open source security and how to tackle them, as well as how to master the best practices of managing your open source security risks. This ... Read More
Saleem Padani

Saleem Padani

Saleem is a highly accomplished business, marketing and technology leader with track-record of success in startups, mid-size and large technology and professional services organizations, currently the COO at MediaOps, Worldwide Program Director & Technical Evangelist at IBM, Director of Industry Solutions at Neuvis, Co-founder & Vice President of LexiBridge and Senior Software Architect at DataEase International. Saleem has passion for leading and empowering global teams to drive new initiatives, leveraging broad & deep business, strategic, marketing, technical and solution delivery skills. Saleem has an Executive M.B.A, from University of Texas at Dallas, Master’s and Bachelor’s Degree in Computer Engineering.

saleem has 16 posts and counting.See all posts by saleem