Remove the-challenges-of-mobile-application-security
article thumbnail

How Thales and Red Hat Protect Telcos from API Attacks

Thales Cloud Protection & Licensing

How Thales and Red Hat Protect Telcos from API Attacks madhav Thu, 02/22/2024 - 04:55 Application programming interfaces (APIs) power nearly every aspect of modern applications and have become the backbone of today’s economy. Unfortunately, API attacks are increasing as vectors for security incidents. What are APIs?

article thumbnail

Cisco Duo Enhances Epic Mobile Apps Security

Duo's Security Blog

Epic’s new flagship EPCS healthcare management mobile apps Haiku and Canto integrate with Cisco Duo to provide multi-factor authentication (MFA). The challenge According to a recent study by ESG , sponsored by Duo, “76% of organizations have experienced multiple account compromises over the past year.”

Mobile 115
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Google Cybersecurity Action Team Threat Horizons Report #7 Is Out!

Anton on Security

This is my completely informal, uncertified, unreviewed and otherwise completely unofficial blog inspired by my reading of our seventh Threat Horizons Report ( full version ) that we just released ( the official blog for #1 report , my unofficial blogs for #2 , #3 , #4 , #5 and #6 ).

article thumbnail

How Thales and Red Hat Protect Telcos from API Attacks

Security Boulevard

How Thales and Red Hat Protect Telcos from API Attacks madhav Thu, 02/22/2024 - 04:55 Application programming interfaces (APIs) power nearly every aspect of modern applications and have become the backbone of today’s economy. Unfortunately, API attacks are increasing as vectors for security incidents. What are APIs?

article thumbnail

GUEST ESSAY: How the FIDO Alliance helps drive the move to passwordless authentication

The Last Watchdog

This traditional authentication method is challenging to get rid of, mostly because it’s so common. Every new account you sign up for, application you download, or device you purchase requires a password. It enables end users to authenticate to online sites and applications both on mobile and desktop through WebAuthn and CTAP.

article thumbnail

GUEST ESSAY: The case for using augmented reality (AR) and virtual reality (VR) to boost training

The Last Watchdog

Common examples of AR applications include the Pokemon Go mobile game and Snapchat filters. Organizations conduct these sessions to bring participants up to speed on the cybersecurity threat landscape and develop their knowledge of best practices to secure sensitive data, assess risk levels, and report incidents.

article thumbnail

Key takeaways from Malwarebytes 2023 State of Mobile Cybersecurity

Malwarebytes

The results of our latest survey on mobile cybersecurity in K-12 and hospitals are in—and it’s not all peaches and roses. There are plenty of risks associated with mobile devices, and we ignore them at our peril. There are plenty of risks associated with mobile devices, and we ignore them at our peril.

Mobile 75