Sharks are dangerous and distracting. While you were looking at them, cybercriminals just stole millions from a casino. You never know how people can get access to your network.
There are stringent criteria medical devices must meet to be classed as trustworthy, alongside the software within them – but what does that consist of? Learn more about the importance of trustworthy medical devices in part one of our Trustworthy Devices blog series.
As major car brands include mobile apps in vehicles, it’s important to plan the security of these apps carefully. From apps that users install on their smart phones to unlock or start their car, to the apps that are used by service technicians for maintenance and diagnostics, the stakes are high if any of these apps are tampered with. In this blog, we look at the types of apps that can be found in a car, and how vital it is to protect them with a robust security solution.
With the increase in use of mobile apps, the risks of being attacked also goes up. One of the most common threats against iOS apps is Jailbreaking. In this blog, we look at the impact of a device being jailbroken, why an app developer should care if their app is being used on a jailbroken device and some of the reasons Jailbreak detection isn’t being used more in apps today.
Recent announcements and reports show that with the increase of usage in mobile apps, there is indeed an expected increase in the number of cyberattacks. Are apps that contain critical intellectual property the only ones at risk? What about apps that don’t contain secret data or algorithms? Could they need protection too?
Digital key technology is a fantastic step forward for the industry! Today’s leading brands are blending old school car keys with the latest keyless technologies to give drivers a better experience. Join Irdeto’s Connected Transport Compliance Officer, Sven Schmidberger, as he explores how connected transport technology companies are helping big brands expand their business models.
With the significant increase in demand in telemedicine and the rise of cyberthreats, it is essential for telehealth vendors to understand that Protected Health Information are the most lucrative targets for hackers, and they need to be protected. Good-enough protection is no longer enough. In this blog we propose a few tips on how to protect your telemedicine apps.
With everything going on in today’s world, it’s clear that times are definitely changing. Since stay-at-home order were issued, mobile application usage has undergone changes we couldn’t have predicted a year ago. How have these changes impacted the adoption of mobile technologies? And how many app publishers are prepared for this?
With digital connectivity of medical devices being needed more than ever in healthcare, it is important to learn more about the types of medical devices that connect data, what does data governance mean, and why is privacy and security essential in Telehealth.
With the increase of mobile applications being deployed, the market for application security testing tools is growing rapidly and the need for additional application protection is essential. While it is important to use application security testing tools to catch any code errors, it is not the same as protecting an application. Application protection tools are designed to make it unprofitable for a hacker to attack an application.