Piracy Never Rests, Protecting Your Valuable Digital Revenue November 19, 2020 | Video Entertainment |
Using OWASP Mobile Top 10 Vulnerability Framework to review Common Vulnerabilities and Exposures (CVEs) for mobile apps November 5, 2020 | Software Protection |
Are Mobile Device Management Systems giving you a false sense of security? September 30, 2020 | Software Protection |
Think the hardware in your car is secure? You might be surprised at our findings… September 28, 2020 | Transportation |
How to bridge the gap in the shortage of cybersecurity professionals September 16, 2020 | Software Protection |
Anti-Tamper: keeping revenue and games on PC – and console – safe! September 11, 2020 | Video Gaming |
Extending telematics into your construction equipment rental customer journey September 10, 2020 | Transportation |
Think secure hardware is everywhere? Think again! (The results might shock you!) September 3, 2020 | Software Protection |
2020 Was The Tipping Point for the Equipment Rental Customer Journey September 3, 2020 | Transportation |
What is a trustworthy device? How to ensure they are trustworthy and why it’s important? September 1, 2020 | Healthcare |
Think you know which apps are connecting to your car? Think again! August 20, 2020 | Software Protection |
Telemedicine mobile app data security – why it’s essential in today’s connected world August 7, 2020 | Healthcare |
The 4P’s to build your COVID-19 Checklists for Construction Companies June 25, 2020 | Transportation |
What are the types of connected medical device data? Introduction to data governance and why privacy and security are essential in Telehealth June 9, 2020 | Healthcare |
My webcast with Application Security Weekly and why apps are the new endpoints June 3, 2020 | Software Protection |
If I had a million dollars, would I build my own software security team? May 28, 2020 | Software Protection |
Connected Health, Digital Health, Telehealth, and Telemedicine – What are the key differences and why the need for security? April 17, 2020 | Healthcare |
Why is product safety critical for respiratory ventilators during the COVID-19 global pandemic? April 14, 2020 | Healthcare |
How can hospitals be CONFIDENT in the security of their connected infrastructures – even in a pandemic? March 31, 2020 | Healthcare |
Increased cyber risks for video game publishers from record breaking usage March 23, 2020 | Video Gaming |
A day at ConExpo 2020: Space age construction machines, celebrating operators and awkward human interaction. March 19, 2020 | Video Entertainment |
Smart Home Management: How to give subscribers what they really want February 8, 2020 | Trusted Home |
How to future-proof subscriber smart homes? The secret is open standards February 2, 2020 | Trusted Home |
Artificial Intelligence Cage Match: Using AI Defenses Against AI Attacks January 29, 2020 | Software Protection |
Procuring smart home management and the great hardware versus software debate January 26, 2020 | Trusted Home |
The Cable Haunt vulnerability: A wake-up call to all broadband providers January 22, 2020 | Trusted Home |
IoT Fingerprinting and the value of insight on the smart home experience January 19, 2020 | Trusted Home |
Five questions every ISP should ask before procuring a smart home management system January 15, 2020 | Trusted Home |