Mobile security

5 myths of API security

In light of Panera Bread’s API-related data breach, here what is — and isn’t — true about protecting application programming interfaces.

CISOs will have increasing influence on the top management: Biju K, Federal Bank

Businesses across the globe have started to see information security as a business priority and this alignment has enhanced the influence of CISOs on top management, says Biju K, Chief Information Security Head of Federal Bank.

ManageEngine fixes critical zero-day vulnerabilities that could affect close to 10,000 companies in India

Here’s all you need to know about ManageEngine’s zero-day vulnerabilities, and what the company has done to remediate the problem

Three out of four organizations lack proper incident response plans: IBM-Ponemon report

There’s no denying that fortifying defenses is the first step to cyber-resiliency. What takes a back seat though, is the lack of proper incident response plans. IBM-Ponemon’s 2018 cyber-resiliency study reveals 77 percent of firms lack proper incident response plans.

What is security’s role in digital transformation?

Digital transformation is front of mind for many senior executives, but too often security is left behind.

Mobile ransomware, banking malware threats on a rise: Report

The number of unique mobile malware samples increased to 108,439 in 2017, which was 94 percent more than the total in 2016.

Feds move to secure mobile devices with machine learning, biometrics

As mobile device use increases among U.S. government workers, IT and security officials are scrambling to better secure devices, leaving behind traditional anti-malware tools in favor of mobile threat detection and role-driven access rules.

Reaper emerges a cyber security threat for global enterprises

APT37, popularly known as Reaper has been primarily targeting the chemicals, electronics, manufacturing, aerospace, automotive, and healthcare industries for North Korean state interests.

Android for enterprise: Google specifies devices and guidelines

Google has laid down the minimum standards for smartphones to ensure their safe and effective use in the enterprise.

Partner Content
Smartphones & security: How to keep enterprise data safe

Security expert and Pluralsight author, Dale Meredith, explains how to protect your enterprise from hackers by focusing on mobile security. Learn more.

What makes the digital payments space in India an unguarded minefield

In wake of the National Cyber Security Coordinator’s startling revelation of 1.5 lakh online transactions being compromised every day, digital payment companies in India are walking on thin ice when it comes to protecting user data.

Partner Content
Learning Path: Developing Microsoft Azure and Web Services (Microsoft Exam 70-487)

Microsoft offers a set of certifications that validate a software developer's expertise in Microsoft technologies.