Is your device protected by secure hardware? The answer might surprise you! In this blog, we take a deeper look into what secure hardware is, how commonplace it is in devices, why some manufactures might not include it, how reliable it is and some other possible security options that can be used instead.
Why hackers might target your mobile app – the reasons might surprise you! Check out my webcast with Application Security Weekly to find out more about why apps are the new endpoints.
With society being forced to stay home because of the COVID-19 global pandemic, people are increasingly turning to mobile devices and applications to occupy their time. Cyber criminals are seeking out any opportunity they can to take advantage of the current circumstances and hack into devices and networks.
With the increase of mobile applications being deployed, the market for application security testing tools is growing rapidly and the need for additional application protection is essential. While it is important to use application security testing tools to catch any code errors, it is not the same as protecting an application. Application protection tools are designed to make it unprofitable for a hacker to attack an application.
Software is the invisible fabric that enables the world to interact, transact, and function. Software is at the heart of an amazing and bewildering explosion of functionality: from running your washing machine, to pumping your […]
The modern world is connected. Globalization has resulted in industries competing with counterparts in distant locations. Increased competition has led to a drive for efficiency and optimization in the race to remain profitable. Digital Twins […]
In our last post, we discussed how recent advances in AI and ML can be used for good and bad. In this installment, I’ll explain why it’s so easy for security vulnerabilities to make their […]
The manufacturing industry already appreciates the cost savings and efficiency improvements that digital twins offer. With information about the design, operation, and maintenance of devices all in one place, the digital twin model facilitates everything […]
A big part of Industry 4.0 requires the successful integration of the supply chain into the manufacturing process. In the ideal vision, a close cooperation, with rapid information sharing, is established between suppliers, the manufacturer […]
A light-hearted animation explains some of the key features of good software protection… Enjoy!