One of the major issues in the cybersecurity industry is the shortage of cybersecurity professionals. A 2019 study found that there was a global deficit of more than four million cybersecurity professionals and now we need to consider which areas are being impacted the most, how to address this shortage and what’s the best solution going forward.
Is your device protected by secure hardware? The answer might surprise you! In this blog, we take a deeper look into what secure hardware is, how commonplace it is in devices, why some manufactures might not include it, how reliable it is and some other possible security options that can be used instead.
There are stringent criteria medical devices must meet to be classed as trustworthy, alongside the software within them – but what does that consist of? Learn more about the importance of trustworthy medical devices in part one of our Trustworthy Devices blog series.
With the uncertainty surrounding of children going back to school or continuing in-home learning, it is timely to talk about managing kids time on screens. Although no two families’ approach on this topic is the same, there’s strong evidence that many want help in applying screen time limits. In this blog, I share my thoughts on how ISPs can help parents when every family has a different approach to digital parenting.
Right now, Android smartphones are dominating the market, so it stands to reason that Android apps and devices are a prime target for cybercriminals. Rooting an Android device makes it even more vulnerable to attacks. In this blog we discuss why it’s so important for app developers to understand the risks to their app and data if they are running on a compromised device.
As major car brands include mobile apps in vehicles, it’s important to plan the security of these apps carefully. From apps that users install on their smart phones to unlock or start their car, to the apps that are used by service technicians for maintenance and diagnostics, the stakes are high if any of these apps are tampered with. In this blog, we look at the types of apps that can be found in a car, and how vital it is to protect them with a robust security solution.
If you have ever played a competitive PC game, than you probably have played against a cheater at one point or another. Cheating in multiplayer video games has become one of the largest issues for publishers, so the Denuvo team set out to build a best-in-breed solution to bring fairness back to gaming. As Denuvo Anti-Cheat grows in popularity, people are having a lot of questions about how it works. With that in mind, here are some of the most common myths about Denuvo Anti-Cheat and some hard-cold facts.
Throughout our Telehealth and Telemedicine blog series, we looked at the differences between connected health technologies, types of connected medical devices, the basics of data security and privacy, key HIPAA compliance regulations, why app developers and vendors should implement strong cybersecurity measures to meet these regulations and the possible repercussions that could occur if they aren’t implemented. In this blog, we review what this all means.
Anyone that deals with Personally Identifiable Information and Protected Health Information must comply with the Health Insurance Portability and Accountability Act (HIPAA), including telemedicine providers and platforms. In this blog we investigate further into the HIPAA rules and why it’s so important to comply.
With more than 2.5 billion video game players worldwide, it comes as no surprise that amongst these players are cheaters. Denuvo’s Anti-Cheat solution helps level the playing field. As such, creating rumors and myths around any anti-cheat has also become a favorite hobby among cheaters. With that in mind, here are some hard cold facts about Denuvo Anti-Cheat.