Comment les tests de sécurité d’applications doivent changer dans un monde DevOps world agile

security-text-on-screen

Dans le contexte actuel de la cyber sécurité, il est essentiel d’élaborer une stratégie de sécurité qui couvre tous les angles d’attaque. Les entreprises doivent en permanence évaluer leur niveau de préparation et améliorer la gestion et les processus pour avoir toujours un coup d’avance sur des individus mal intentionnés. Les applications sont une des […]

How application security testing needs to change in an agile, DevOps world

security-text-on-screen

In today’s dynamic cyber-attack landscape, a robust security strategy that looks at all attack surfaces is critical. Enterprises must tirelessly assess their current state of readiness and continually improve governance and processes to stay a step ahead of malicious actors. Applications are one of the preferred attack vectors with up to 90% of successful breaches […]

The letterbox problem with voicebox assistants

There are lots of voice activated tools and services now available from software on your PC and in your car to physical hardware you can place around your home. These devices and associated requests are becoming everyday occurrences, “Alexa, whats the weather” to“Siri, recipe for Chocolate Cake” (too many to list). The two main ways to […]

The latest Android vulnerabilities threatening enterprises

A pair of major vulnerabilities have emerged in Android apps in recent months, according to mobile app risk management vendor Appthority. The company’s quarterly enterprise mobile threat update flags the emergence of rooting and overlay malware in Android apps. Three specific examples of rooting malware were detected in the third quarter inside apps on the Google Play […]

6 keys to enterprise mobile security

mobile device security enterprise IT CSC Blogs

There was a time when mobile devices just didn’t face the same kind of threats from attackers and malware as full-featured operating systems did. Those days are gone. Criminals, spies and whoever wants to access data have to make the transition to exploiting mobile devices because that’s where the users, apps and data reside today. The […]