Why hackers might target your mobile app – the reasons might surprise you! Check out my webcast with Application Security Weekly to find out more about why apps are the new endpoints.
Is it worth investing in an internal security team? In this blog, we look at how some software applications have defended themselves from reverse engineering by investing heavily and developing their own custom anti-analysis solutions.
With society being forced to stay home because of the COVID-19 global pandemic, people are increasingly turning to mobile devices and applications to occupy their time. Cyber criminals are seeking out any opportunity they can to take advantage of the current circumstances and hack into devices and networks.
With the increase of mobile applications being deployed, the market for application security testing tools is growing rapidly and the need for additional application protection is essential. While it is important to use application security testing tools to catch any code errors, it is not the same as protecting an application. Application protection tools are designed to make it unprofitable for a hacker to attack an application.
With the usage of connected health technologies increasing greatly, it is important for us to understand the differences between Connected Health, Digital Health, and Telehealth and Telemedicine which are often used interchangeably.
A recent survey of 8,000 Europeans found quality broadband and Wi-Fi in our homes is now more valuable to consumers than sex, holidays, their favorite TV channels or chocolate.
Some 20 billion Internet of Things (IoT) devices will be sold in the next few years, a large proportion of which will be to augment the smart home for everything from heating, ventilation and lighting control to CCTV, smart assistants and nanny-cams. As a result, there are challenges around security, connectivity and control which must be addressed
Our team is back from Las Vegas where Black Hat USA 2019 was held two weeks ago. The main themes this year included IoT, application security, and the role of humans in security and privacy. […]
A big part of Industry 4.0 requires the successful integration of the supply chain into the manufacturing process. In the ideal vision, a close cooperation, with rapid information sharing, is established between suppliers, the manufacturer […]
Internet of Medical Things (IoMT) devices are already revolutionizing the healthcare business. They are delivering on their promises of improved data access, convenience, operational efficiencies and automation for the Health Care Providers (HCP). Additional drivers […]