mobile
Your device’s safety in someone else’s hands: root and jailbreak
December 02 by Paweł BułatRooting and jailbreaking are used to circumnavigate limitations on Android and iOS system but these strategies can have serious affects on a device's security
Three US state laws are providing safe harbor against breaches
September 08 by Kayne McGladreyThree US state laws passed between 2018 and 2021 are encouraging organizations not currently following a cyber security control framework to look to update their security programs
Harnessing A Present & Future Fraught With Danger
November 12 by Seth AdlerThis demo showcases How to guard against the vast majority of threats entering the organization via Email; How Information Protection should be focused on people while ensuring that data doesn’t lose...
Security Standards For 5G
March 23 by Esther SheinGartner predicts that the 5G enterprise IoT endpoint installed base will more than triple between 2020 and 2021, from 3.5 million units in 2020 to 11.4 million units in 2021. By 2023, the enterprise 5...
The Case For Stronger Cyber Security Efforts In APAC
May 29 by Alarice RajagopalAPAC’s cyber risk becomes more increased as digitalization is on the rise in combination with users who are unaware of threats including viruses, phishing or malware.
Incident Of The Week: Dunkin’ Donuts Reports Credential Stuffing Attack
February 15 by Alarice RajagopalDunkin’ Donuts first reported a credential stuffing attack at the end of November last year, and is now notifying users of more account breaches following a new attack.
Celebrate International Data Privacy Day 2019 With This Expert Advice
January 28 by Rebecca WynnData Protection Day commemorates the January 28, 1981, signing of Convention 108, the first legally binding international treaty dealing with privacy and data protection.
5 Reasons To Use Biometrics To Secure Mobile Devices
January 24 by CSHub.com Editorial StaffIt is no secret that mobile devices are under attack. From phishing scams to a host of other issues, mobile devices are increasingly seen as a vulnerability in the enterprise, and as an easy target fo...
When Politics And Cyber Security Collide
January 23 by Alarice Rajagopal“You have to remain current,” says Former Naval Officer, Silicon Valley Executive and Entrepreneur, and current Vice President of Cyber Security of the Institute of World Politics, Dean Lane.
Incident Of The Week: Massive 'Collection #1' Data Breach Exposes 773 Million Emails
January 18 by Esther SheinSome 773 million email addresses and nearly 22 million passwords have been leaked and distributed in a folder dubbed “Collection #1,” on the MEGA cloud service, according to security blogger Troy Hunt...
9 Cyber Security Priorities For 2019
January 14 by CSHub.com Editorial StaffCyber Security Hub recently fielded a survey to its subscribers, which revealed 9 top-of-mind challenges, trends and focus areas for cyber security professionals to tackle in 2019. From enterprise str...
What Digital Transformation Means for Cyber Security Professionals
November 12 by Esther SheinDigital transformation is undoubtedly a good move for businesses, but it is creating headaches for security professionals who now must safeguard data beyond the traditional network perimeter and on mo...