Why Isn’t Mobile at the Center of Your Cybersecurity Strategy?

Why Isn’t Mobile at the Center of Your Cybersecurity Strategy?

This is the first article in a guest blog series by Jason Bloomberg, Managing Partner, Intellyx Focusing on user authentication, including multi-factor authentication, is not enough to put mobile at the center of ...
The Rise of Super Apps: Challenges & Opportunities in Mobile Security

The Rise of Super Apps: Challenges & Opportunities in Mobile Security

In recent years, the tech world has witnessed a significant shift towards what are known as "super apps." These mobile applications have become increasingly popular, offering a plethora of services within a ...
Private 5G, Wi-Fi, cyberattacks, nation-state, security, 5G networks, landscape, CISA SASE Security

Gaining Security and Flexibility With Private 5G

Private 5G is considered a safer alternative to Wi-Fi and public mobile networks and is the preferred network backbone for business-critical apps ...
Security Boulevard
border device CBP Loses Photos

Attorney-Client Privilege at the Border

A recent case has interesting implications for the privacy of attorney-client privileged information at the border ...
Security Boulevard
A Practical Guide to OWASP MASVS v2.0 - Its Evolution and Implementation

A Practical Guide to OWASP MASVS v2.0 – Its Evolution and Implementation

What is OWASP MASVS? The OWASP (Open Worldwide Application Security Project) MASVS (Mobile Application Security Verification Standard) is a valuable resource for mobile app developers seeking to improve the security posture of ...
SEC SIM swap X account

Addressing the Mobile Malware Threat With Zero-Trust

AI-enabled zero-trust solutions can help address the rising threat of mobile malware ...
Security Boulevard
AEP browser endpoint multi-vector EDR

Advanced Endpoint Protection (AEP): What Are the Options?

Advanced endpoint protection, often referred to as AEP, is a comprehensive cybersecurity solution designed to protect an organization’s endpoints, such as desktops, laptops and mobile devices, from various types of cybersecurity threats ...
Security Boulevard
How Mobile Device Management Helps in Unified Management of Endpoints

How Mobile Device Management Helps in Unified Management of Endpoints

The extensive use of mobile devices for corporate-related tasks has revolutionized work models, with hybrid approaches dominating the business landscape.Read More The post How Mobile Device Management Helps in Unified Management of ...
How Mobile Device Management Helps in Unified Management of Endpoints

How Mobile Device Management Helps in Unified Management of Endpoints

The extensive use of mobile devices for corporate-related tasks has revolutionized work models, with hybrid approaches dominating the business landscape.Read More The post How Mobile Device Management Helps in Unified Management of ...
Mobile App Testing: Top-notch Security

Mobile App Testing: Top-notch Security

Introduction Our daily lives have become completely dependent on mobile applications. To ensure secure mobile app testing, top-notch security is necessary. This makes a variety of chores easier and is always at ...