HackDig : Dig high-quality web security articles for hackers

Joint Cybersecurity Advisory on Threat Hunting and Incident Response Released

A joint cybersecurity advisory released on September 1st detailed technical methods for uncovering and responding to malicious activity including best practice mitigations and common missteps. A collaborative effort, this advisory (coded AA20-245A) is the product of research from the cybersecurity organizations of five nations. Those include the United State
Publish At:2020-09-15 01:50 | Read:104 | Comments:0 | Tags:Cyber Security advisory incident response threat security cy

What Is the EU Cybersecurity Act and What Does It Mean for US-Based Businesses?

During the previous weeks, we provided a thorough overview of the EU NIS Directive, focusing on the Operators of Essential Systems (OES), the Digital Service Providers (DSP) and the compliance frameworks. Our review of the EU cybersecurity policy and strategy would be incomplete without mentioning the EU Cybersecurity Act. On 27 June, the European Cybersecur
Publish At:2020-08-31 01:00 | Read:190 | Comments:0 | Tags:Regulatory Compliance business Cyber Security EU legislation

Cyber Defense Magazine – August 2020 has arrived. Enjoy it!

Cyber Defense Magazine august 2020 Edition has arrived. We hope you enjoy this month’s edition…packed with over 147 pages of excellent content. OVER 145 PAGESALWAYS FREE – LOADED WITH EXCELLENT CONTENTLearn from the experts, cybersecurity best practicesFind out about upcoming information security related conferences, expos and trade shows.  Al
Publish At:2020-08-05 18:41 | Read:317 | Comments:0 | Tags:Breaking News Security cyber defense magazine cyber security

Accomplished Global Sales Leader, Ed Carter, Joins Zimperium as Chief Revenue Officer

Zimperium today announced that Ed Carter has joined the company as Chief Revenue Officer. Leveraging more than 20 years of leadership experience, Ed will play a strategic role in accelerating Zimperium’s industry-leading growth and expansion by leading all global sales and channels.  “We are excited to welcome Ed to the Zimperium team,” said Shridhar Mittal
Publish At:2020-07-28 14:25 | Read:213 | Comments:0 | Tags:News cyber security ZIMPERIUM

10 Essential Bug Bounty Programs of 2020

In 2019, the State of Security published its most recent list of essential bug bounty frameworks. Numerous organizations and government entities have launched their own vulnerability reward programs (VRPs) since then. COVID-19 has changed the digital security landscape, as well. With that in mind, it’s time for an updated list.Here are 10 essential bug bount
Publish At:2020-06-15 06:53 | Read:437 | Comments:0 | Tags:Cyber Security Featured Articles Bug Bounty ethical hacker v

What Truly Matters for Remote Workers Using GFE and BYOD Mobile Devices

The world has changed and we all know it. Mobile operations are at the forefront of every organization and so is mobile security. We’ve all seen attacks as simple as malicious apps, SMS phishing and man-in-the-middle attacks; to the more challenging, such as elevation of privileges, exfiltration of data and command and control manipulation. What you may not
Publish At:2020-05-24 07:37 | Read:513 | Comments:0 | Tags:Mobile Security advanced mobile threat defense BYOD cyber se

Zimperium Partners with ZecOps to Deliver the Only Integrated Mobile Threat Defense and Automated Digital Forensics Solu

Integration extends Zimperium solution to include ZecOps’ automated agentless Digital Forensics and Incident Response (DFIR) capabilities Our new strategic partnership with ZecOps, the leading agentless automated Digital Forensics and Incident Response (DFIR) company, provides Zimperium customers with the only comprehensive mobile detection, forensics and i
Publish At:2020-05-18 11:56 | Read:505 | Comments:0 | Tags:Mobile Security advanced mobile threat defense cyber securit

Top 5 Ways to Secure All Remote Workers with Microsoft & Zimperium

I had the pleasure of recently conducting a timely webinar on the Top Five Ways to Secure All Remote Workers with two executives from our partners at Microsoft – – Dave Randall, Senior Program Manager of Endpoint Manager, and Aasawari Navathe, Program Manager. The world changed overnight Even before the pandemic, it’s surprising how quickl
Publish At:2020-05-18 11:56 | Read:411 | Comments:0 | Tags:Mobile Security advanced mobile threat defense BYOD Complian

3 Reasons Security is Foundational for Mobile App Development

On any given day, I’ll read at least one article about an enterprise release of a new app. I’ll also see many more that I just don’t have time to read. I have noticed that certain themes recur across the articles–more on that in a moment. But I have also noticed one glaring absence. What I am not seeing is attention to mobile app security. From one pe
Publish At:2020-05-18 11:56 | Read:562 | Comments:0 | Tags:App Security advanced mobile threat defense apps cyber secur

Cyber Security 101: How Much Do You Really Know?

Cyber Security 101: How Much Do You Really Know? April 21st, 2020 No Comments Data Protection, Online Safety, PC security, Uncategorized Cyberattacks. We hear about them everywhere – from your neighbor whose son downloaded a video game that cr
Publish At:2020-05-03 14:45 | Read:669 | Comments:0 | Tags:Data Protection Online Safety PC security Uncategorized Cybe

3 Reasons Mobile App Security Should be a Top Priority

There is a reasonable chance you are reading this blog using an app on a mobile device. As of 2019, 53% of all internet traffic was from mobile devices such as smartphones and tablets (and growing). And if you are reading this on a smartphone app, then it’s a near-certainty the device you are using is susceptible to threats right this moment. Our own intern
Publish At:2020-04-14 10:00 | Read:845 | Comments:0 | Tags:App Security apps cyber security Enterprise Mobility and Sec

App Shielding vs. In-App Protection

Mobile devices and the apps operating on them expose your backend systems to cyberattacks. Attackers exploit vulnerabilities in mobile operating systems and in your apps to spy on your users, grab their private data, or even steal their money. In response, many mobile app developers are using app shielding, sometimes called “app hardening,” to p
Publish At:2020-04-08 12:08 | Read:983 | Comments:0 | Tags:App Security advanced mobile threat defense apps cyber secur

The State of the Cybersecurity Market: Where We’ve Come, Where We’re Going

There’s an interesting trend that I have personally noticed over the past few years: organizations are starting to take cybersecurity more seriously. With the multitude of high-profile data breaches, organizations are starting to realize that cybersecurity is a significant risk to the business. This allows CISOs and other similar titles with leadership respo
Publish At:2020-03-16 23:05 | Read:673 | Comments:0 | Tags:Cyber Security CISO cybersecurity risk

Zimperium Wins Multiple Cybersecurity Awards at RSA

Zimperium, the global leader in mobile threat defense (MTD), was presented with six awards during the RSA Conference this week.  The 2020 Cybersecurity Excellence Awards announced Zimperium as the Gold Winner in the Mobile Threat Defense (MTD) category, for zPlatform and Silver Winner in the Best Cybersecurity Company (100-499 employees). This is the fifth
Publish At:2020-02-26 11:40 | Read:753 | Comments:0 | Tags:Awards advanced mobile threat defense cyber security

Zimperium First to Integrate Mobile Threat Defense with Microsoft Azure Sentinel SIEM Solution

Zimperium now integrates with Endpoint Manager (formerly Intune), Microsoft Defender ATP, Azure Active Directory and Azure Sentinel SIEM In January, we announced our integration with the Microsoft Defender Advanced Threat Protection (ATP) endpoint detection and response (EDR) solution. Our mobile threat defense (MTD) integration with Microsoft Defender ATP
Publish At:2020-02-25 09:48 | Read:741 | Comments:0 | Tags:Mobile Security advanced mobile threat defense cyber securit

Tools

Tag Cloud