With digital connectivity of medical devices being needed more than ever in healthcare, it is important to learn more about the types of medical devices that connect data, what does data governance mean, and why is privacy and security essential in Telehealth.
Why hackers might target your mobile app – the reasons might surprise you! Check out my webcast with Application Security Weekly to find out more about why apps are the new endpoints.
Is it worth investing in an internal security team? In this blog, we look at how some software applications have defended themselves from reverse engineering by investing heavily and developing their own custom anti-analysis solutions.
With society being forced to stay home because of the COVID-19 global pandemic, people are increasingly turning to mobile devices and applications to occupy their time. Cyber criminals are seeking out any opportunity they can to take advantage of the current circumstances and hack into devices and networks.
With the increase of mobile applications being deployed, the market for application security testing tools is growing rapidly and the need for additional application protection is essential. While it is important to use application security testing tools to catch any code errors, it is not the same as protecting an application. Application protection tools are designed to make it unprofitable for a hacker to attack an application.
Software is the invisible fabric that enables the world to interact, transact, and function. Software is at the heart of an amazing and bewildering explosion of functionality: from running your washing machine, to pumping your […]
Hang on. Isn’t hyper-connectivity meant to be boosting service revenue? Why are we talking about protecting revenue? Mark Hearn explains more…
A light-hearted animation explains some of the key features of good software protection… Enjoy!
Digital twins are rapidly gaining popularity for the design and management of complex systems. The rise in availability of modeling tools coupled with continuous streams of real time data from live processes have turned the use of digital twins into a must for the system owner and operator. But what is the twin in the hands of a potential hacker? Read Dave Belt’s new blog…
In the latest Cloakware® Cate video Catherine shows us how commonly available tools like debuggers can be used, with live data, by a hacker to effectively subvert an application. This simple demonstration captures the essentials […]