core security

core security news search results

Developer news items we found relating to core security

8 results
5-app-development-tips-to-help-you-avoid-disaster

5 app development tips to help you avoid disaster


Wednesday, November 28, 2018 by

Mobile app development: it’s easy and straightforward in the lab, but once your app is deployed to the wild, all bets are off. You need to deliver seamless, fast experiences for users on low-powered devices, in any number of network environments. When it comes to building mobile apps, uncontrollable user behavior can lead you down the path to death by 1000 pape...


Dashlane-to-utilize-Android

Dashlane to utilize Android's new support for password managers


Monday, May 29, 2017 by

Google announced native support for password managers in Android O and an early preview of Autofill with Google, which in the absence of a password manager, allows the user to use information from Chrome Sync and Google Payments to autofill apps. By offering basic functionality out-of-the-box and making it much easier for users to adopt and use a password management app...


Signalling-protection-from-AdaptiveMobile-with-new-SPG

Signalling protection from AdaptiveMobile with new SPG


Friday, February 24, 2017 by

AdaptiveMobile announced it's Signalling Protection Gateway (SPG) - expanding its core security offerings with new network integration, deployment and routing capabilities to allow their Signalling Protection to be deployed independently from legacy or capacity limited network infrastructure.The SPG is based on technology from Dialogic’s signalling platform. The partner...


LogDog-now-lets-you-protect-your-Slack-and-LinkedIn-accounts-too

LogDog now lets you protect your Slack and LinkedIn accounts too


Tuesday, December 13, 2016 by

LogDog, an app that is guarding user's online accounts against hacking, announces the addition of Slack and LinkedIn protection to its Android app. LogDog alerts users as soon as there's any suspicious activity on their online accounts, as they occur, providing valuable information for users to mitigate the threat.Just how real of an imminent threat is professional acco...


What

What's so tricky about Android security anyway


Monday, December 12, 2016 by

Android authentication can be a tricky business because it can help identify the user, but it can also open the door to hackers at the same time. It all comes down to the device administrator access which comes with a lot of benefits like. Device administrator access provides complete device management access rights that include creating and managing poli...


Core-Security-is-making-the-password-reset-process-selfservice,-faster-and-simpler

Core Security is making the password reset process selfservice, faster and simpler


Wednesday, November 30, 2016 by

Core Security announced the release of Core Mobile Reset 1.0 and Core Access Insight 9.2. With the introduction of these solution updates, enterprise security teams will now be able to resolve immediate threats with prognostic analytics applied to the big identity and access data, while also enhancing organizational efficiency.Ineffective password management i...


Companies-Reporting-Widespread-Use-of-APIs-as-Business-Drivers

Companies Reporting Widespread Use of APIs as Business Drivers


Monday, March 28, 2016 by

In a recent CA Technologies study titled “APIs and the Digital Enterprise: From Operational Efficiency to Digital Disruption,” companies reported widespread use of APIs, but lack the full capacity for comprehensive API success. The global online survey of 1,442 senior IT and business executives was sponsored by CA Technologies and conducted by industry analyst firm Free...


New-Mobile-Security-Report-Shows-Most-Apps-Have-Critical-Vulnerabilities

New Mobile Security Report Shows Most Apps Have Critical Vulnerabilities


Tuesday, November 10, 2015 by

Checkmarx and AppSec Labs have released a new mobile app security titled “The State of Mobile Application Security 2014-2015”. Among the findings of the report is that the typical app is exposed to an average of 9 different vulnerabilities. The report also indicates in situations where vulnerabilities are built into the code or application logic, the vulnerability of iO...