Why hackers might target your mobile app – the reasons might surprise you! Check out my webcast with Application Security Weekly to find out more about why apps are the new endpoints.
Is it worth investing in an internal security team? In this blog, we look at how some software applications have defended themselves from reverse engineering by investing heavily and developing their own custom anti-analysis solutions.
With society being forced to stay home because of the COVID-19 global pandemic, people are increasingly turning to mobile devices and applications to occupy their time. Cyber criminals are seeking out any opportunity they can to take advantage of the current circumstances and hack into devices and networks.
With the increase of mobile applications being deployed, the market for application security testing tools is growing rapidly and the need for additional application protection is essential. While it is important to use application security testing tools to catch any code errors, it is not the same as protecting an application. Application protection tools are designed to make it unprofitable for a hacker to attack an application.
Software is the invisible fabric that enables the world to interact, transact, and function. Software is at the heart of an amazing and bewildering explosion of functionality: from running your washing machine, to pumping your […]
For the average consumer, hopping online to shop is as commonplace as physically going to the mall. No one thinks for a moment about how relatively unsafe it is to conduct business on the web. But in spite of our years’ long dependence on the web for commerce, it’s still astonishingly easy for cybercriminals to hack web-based transactions.
The reason? Web browsers. The fundamental insecurity of web browsers is arguably the weakest link in cyber security today.
Just in time for 2017 predictions about the pay-media industry. Typically, there’s always something about disruptors. But let’s be frank, so far the so-called disruptors haven’t brought the industry to its knees. Isthe industry too resilient or is the real disruptor yet to make an entrance?
What got me thinking
Last Sunday, after a pleading text from my student son I transferred money to his account. It took 26 seconds to reach his account!
Consolidation within the media industry shows no sign of stopping. It’s happening on both sides: vendors and customers. When it comes to security vendor consolidation why is it important to look beyond the press release?
The beat goes on
Hearing about vendor consolidation or rumored consolidation is common place. It’s part and parcel of our industry.
Pay-TV operators have used CA since the 1990s to encrypt digital content. Over the years, CA has evolved, with Irdeto launching the first software based card-less CA in 2011. But does the CA technology still have a role to play going forward?
CA started life in the analogue broadcast world. Its role was to scramble the video signal. With the evolution to digital broadcast, CA transformed to what you can call “true” conditional access with encryption.
We live in a very different world today than we did 10-20 years ago. We’ve never been more connected. So, it’s surprising that software security practices remain in the realm of “We’ve always done it this way before”. Can they really expect to solve today’s security problems with an old way of thinking?
Traditional thinking typically starts with the premise that honest parties control the computer devices and any cryptographic operations are performed free from interference from would-be attackers. Given this, it’s probably understandable