5 app development tips to help you avoid disaster
Wednesday, November 28, 2018 by Joe Hanson
Mobile app development: it’s easy and straightforward in the lab, but once your app is deployed to the wild, all bets are off. You need to deliver seamless, fast experiences for users on low-powered devices, in any number of network environments.
When it comes to building mobile apps, uncontrollable user behavior can lead you down the path to death by 1000 pape...
Dashlane to utilize Android's new support for password managers
Monday, May 29, 2017 by Austin Harris
Google announced native support for password managers in Android O and an early preview of Autofill with Google, which in the absence of a password manager, allows the user to use information from Chrome Sync and Google Payments to autofill apps. By offering basic functionality out-of-the-box and making it much easier for users to adopt and use a password management app...
Signalling protection from AdaptiveMobile with new SPG
Friday, February 24, 2017 by Austin Harris
AdaptiveMobile announced it's Signalling Protection Gateway (SPG) - expanding its core security offerings with new network integration, deployment and routing capabilities to allow their Signalling Protection to be deployed independently from legacy or capacity limited network infrastructure.The SPG is based on technology from Dialogic’s signalling platform. The partner...
LogDog now lets you protect your Slack and LinkedIn accounts too
Tuesday, December 13, 2016 by Austin Harris
LogDog, an app that is guarding user's online accounts against hacking, announces the addition of Slack and LinkedIn protection to its Android app. LogDog alerts users as soon as there's any suspicious activity on their online accounts, as they occur, providing valuable information for users to mitigate the threat.Just how real of an imminent threat is professional acco...
What's so tricky about Android security anyway
Monday, December 12, 2016 by Don Duncan
Android authentication can be a tricky business because it can help identify the user, but it can also open the door to hackers at the same time. It all comes down to the device administrator access which comes with a lot of benefits like. Device administrator access provides complete device management access rights that include creating and managing poli...
Core Security is making the password reset process selfservice, faster and simpler
Wednesday, November 30, 2016 by Richard Harris
Core Security announced the release of Core Mobile Reset 1.0 and Core Access Insight 9.2. With the introduction of these solution updates, enterprise security teams will now be able to resolve immediate threats with prognostic analytics applied to the big identity and access data, while also enhancing organizational efficiency.Ineffective password management i...
Tips to Use Penetration Testing to Protect Your Business From Cyber Attacks
Thursday, May 12, 2016 by Joaquín Rodríguez Varela
Forty-seven percent of all breaches were caused by malicious or criminal attacks according to the most recent global data breach study released by the Ponemon Institute. Resolving an attack cost businesses an average of $170 per record, translating to an average total cost of $3.79 million for a data breach.Today’s cybercriminals are getting smarter at finding and breac...
Companies Reporting Widespread Use of APIs as Business Drivers
Monday, March 28, 2016 by Stuart Parkerson
In a recent CA Technologies study titled “APIs and the Digital Enterprise: From Operational Efficiency to Digital Disruption,” companies reported widespread use of APIs, but lack the full capacity for comprehensive API success. The global online survey of 1,442 senior IT and business executives was sponsored by CA Technologies and conducted by industry analyst firm Free...
New Mobile Security Report Shows Most Apps Have Critical Vulnerabilities
Tuesday, November 10, 2015 by Richard Harris
Checkmarx and AppSec Labs have released a new mobile app security titled “The State of Mobile Application Security 2014-2015”. Among the findings of the report is that the typical app is exposed to an average of 9 different vulnerabilities. The report also indicates in situations where vulnerabilities are built into the code or application logic, the vulnerability of iO...