Tag: software security

Why application security testing is only half the battle

With the increase of mobile applications being deployed, the market for application security testing tools is growing rapidly and the need for additional application protection is essential. While it is important to use application security testing tools to catch any code errors, it is not the same as protecting an application. Application protection tools are designed to make it unprofitable for a hacker to attack an application.

Read More

Making secure browsers a reality

For the average consumer, hopping online to shop is as commonplace as physically going to the mall. No one thinks for a moment about how relatively unsafe it is to conduct business on the web. But in spite of our years’ long dependence on the web for commerce, it’s still astonishingly easy for cybercriminals to hack web-based transactions.

The reason? Web browsers. The fundamental insecurity of web browsers is arguably the weakest link in cyber security today.

Read More

Will the real pay-media disruptor please stand up?

Just in time for 2017 predictions about the pay-media industry. Typically, there’s always something about disruptors. But let’s be frank, so far the so-called disruptors haven’t brought the industry to its knees. Isthe industry too resilient or is the real disruptor yet to make an entrance?

What got me thinking
Last Sunday, after a pleading text from my student son I transferred money to his account. It took 26 seconds to reach his account!

Read More

Looking at the role of CA today and in the future

Pay-TV operators have used CA since the 1990s to encrypt digital content. Over the years, CA has evolved, with Irdeto launching the first software based card-less CA in 2011. But does the CA technology still have a role to play going forward?

Looking back
CA started life in the analogue broadcast world. Its role was to scramble the video signal. With the evolution to digital broadcast, CA transformed to what you can call “true” conditional access with encryption.

Read More
Loading