HackDig : Dig high-quality web security articles for hacker

Zimperium Announces Mobile Threat Defense for BYOD users with Microsoft Intune

Today, Microsoft announced an exciting new capability providing additional benefits to users of apps protected by Microsoft Intune app protection policies. You can read the official announcement here. Zimperium device risk-based evaluation is now integrated with Microsoft Intune for protected apps on non-enrolled devices to add another layer of protection f
Publish At:2019-11-12 00:25 | Read:373 | Comments:0 | Tags:Mobile Security Mobile Threat Defense News Partners BYOD Ent

7 Questions to Ask Your Child’s School About Cybersecurity Protocols

Just a few weeks into the new school year and, already, reports of malicious cyberattacks in schools have hit the headlines. While you’ve made digital security strides in your home, what concerns if any should you have about your child’s data being compromised at school? There’s a long and short answer to that question. The short answer is don’t
Publish At:2019-09-19 23:20 | Read:920 | Comments:0 | Tags:Family Safety BYOD cyberattack cybercrime cybersafety cybers

Don’t Let Liberating Your Employees Give Freedom to Hackers

Liberation. It’s a powerful word. It’s about freedom from limits on thought or behavior.  The reason why I bring this up is because I recently heard from a prospect of mine, here in London, who mentioned he was liberating his employees by giving them the ability to work away from the office. As part of this, he would allow them to work from home on their mo
Publish At:2019-09-19 14:33 | Read:438 | Comments:0 | Tags:Mobile Security Mobile Threat Defense advanced mobile threat

Which are most frequently blacklisted apps by enterprises?

Mobile security firm Appthority published an interesting report that revealed which Android and iOS applications are most frequently blacklisted by enterprises. The company Appthority has published an interesting report that reveals which mobile apps, both Android and iOS, are most frequently blacklisted by enterprises. “The mobile ecosystem in an ente
Publish At:2017-10-04 22:40 | Read:5040 | Comments:0 | Tags:Breaking News Mobile Reports Security blacklisted apps BYOD

Cyber Security Risk: You Can’t Secure It If …

In the course of working with our clients to improve their security posture, I have come across several common themes that often limit a business’s ability to assess and mitigate cyber security risk. Let’s take a look at some of these themes and real-world examples of how they apply. You can’t secure it if…You Don’t Know It̵
Publish At:2016-12-15 06:50 | Read:4183 | Comments:0 | Tags:Featured Articles Risk Management BYOD hack IoT

Healthcare Security and your Doctor’s Cellphone

Healthcare Security and your Doctor’s Cellphone Posted by David Harley on April 7, 2016.I was asked for my response to Skycure’s mobile threat intelligence report, which claimed that ‘One in Five Doctors’ Mobile Device Might be at High Risk’. Not that I’ve
Publish At:2016-04-07 14:55 | Read:2961 | Comments:0 | Tags:David Harley BYOD CYOD mobile security NHS Skycure

BYOD Makes Application Security a Matter of National Security

Several publications have commented on a new study from Harvard’s Berkman Center for Internet and Society. The study was called “Don’t Panic: Making Progress on the ‘Going Dark’ Debate.” Apple and others have designed products with so-called “end-to-end encryption,” meaning that a message between two users can
Publish At:2016-02-12 14:05 | Read:4575 | Comments:0 | Tags:Industry Observations Technical Insight Vulnerabilities Web

5 Guidelines in Battling Cyber Criminals Over Precious Business Data

5 Guidelines in Battling Cyber Criminals Over Precious Business Data, lets’s try to understand how to Ensure Enterprise Security. You would think that a company that stores their clients’ money and handles investments would have tight security measures on their system against cyber attacks. Apparently, this is not always
Publish At:2015-10-15 10:15 | Read:3537 | Comments:0 | Tags:Breaking News Cyber Crime Security BYOD cyber criminals Cybe

3 Tips on How to Create a Cyber Security Culture at Work

This October marks another iteration of National Cyber Security Awareness Month (NCSAM), a program designed to engage both the public and private sectors on good security practices via activities that encourage awareness and resiliency in the event of a national cyber incident.Sponsored by the Department of Homeland Security (DHS) in cooperation with the Nat
Publish At:2015-10-07 13:20 | Read:4307 | Comments:0 | Tags:Featured Articles Security Awareness BYOD cyber security cul

Company’s data at risk due to the use of mobile gambling apps

Veracode has conducted a research on the security of several mobile gambling apps and discovered a number of flaws that expose enterprises to serious risks. If you belong to a global corporation, the most probably think you will find out is that some of your colleagues have installed mobile apps that don’t belong to the work e
Publish At:2015-09-03 17:15 | Read:3352 | Comments:0 | Tags:Breaking News Hacking Security BYOD corporate espionage gamb

How Employees Become Pawns for Hackers

Employees are the greatest security risks, especially since they are prone to be used as pawns for hackers. That’s why they are vulnerable to attacks. Mobile technology has changed the landscape of business these days. It has enabled employees to set up virtual offices, have more work flexibility, and even extend working
Publish At:2015-08-31 01:20 | Read:3754 | Comments:0 | Tags:Breaking News Security Bring Your Own Device BYOD cyber secu

From the Trench of Insecurity

Imagine a circumstance where a significant investment has been made into a data loss prevention (DLP) solution in which it paves the way for a lip-service approach towards cyber security, with the very real-world association of unknown exposures.As amazing as it may seem, here is such a case in history that may leave you with two opinions, which are, in the
Publish At:2015-08-20 17:15 | Read:4587 | Comments:0 | Tags:Cyber Security Featured Articles BYOD Cyber Crime DLP Soluti

BYOD – the tech revolution that wasn’t

Budding technology trends start the same way: X is going to cause a revolution. Be a game changer. Disrupt the company, the industry, the world – maybe even the universe. And then reality sets in. Sure, X might change the lives of some people at some companies, but far from all, and then business bumps along per usual. So goes – perhaps – the Bring Your Own
Publish At:2015-08-20 12:20 | Read:3555 | Comments:0 | Tags:BYOD Consumerization of IT Security

Shadow BYOD: The mobility program you thought you didn’t have

While the federal government might be under the impression that it doesn’t have a BYOD program, it is overlooking a key issue: Shadow BYOD. Shadow BYOD is very similar to Shadow IT, in which employees use technologies — usually to enhance their productivity — that the IT department has not sanctioned or deployed. In Shadow BYOD’s case, it’s the
Publish At:2015-08-19 16:30 | Read:2684 | Comments:0 | Tags:#Data BYOD Federal mobile security

Managing Risks of a Hybrid Cloud Environment When You’re A Small Business

First, it was cloud computing that sparked the imaginations of businesses in terms of all the benefits they could receive. Then, came the division of public and private clouds; some companies wanted to keep their cloud on-premise, while others looked to cloud providers. Now, the next step in the cloud revolution has come—the gradual adoption of the hybrid cl
Publish At:2015-06-29 12:05 | Read:4062 | Comments:0 | Tags:Connecting Security to the Business Featured Articles applic


Share high-quality web security related articles with you:)


Tag Cloud