Archive

Back to homepage
Industry Insights

Unrestricted access to systems and files exposes organizations to cybercrime

UK organisations are leaving themselves vulnerable to cybercrime with over a third of 18-24-year-olds able to access any files on their company network, and only one in five having to

Software

Banking Trojans and cryptojacking on the rise

A new report analyzes threat data collected from approximately 750,000 Morphisec protected endpoints globally, between January 1 and March 31, 2018, as well as from in-depth investigations conducted by the

Mobile

Must Have Factors of a Mobile Security Policy

Mobile devices in the workplace have generated a whole host of cybersecurity issues for companies large and small. Though small and medium sized businesses (SMBs) may think a mobile security

Hardware/Network

The new endpoint security market: Growing in size and scope

Massive funding rounds by CrowdStrike and Cylance demonstrate that endpoint security may be the tip of the cybersecurity spear. Venture capital investments in cybersecurity companies are aggressive these days, but

Industry Insights

5 Top Pieces Of Advice For CISOs

The cyber security market is overwhelmed by buzzwords. Artificial intelligence, machine learning, blockchain – all this attacks CISOs from every possible angle, from webinars and conferences to the media. Most

Software

Cyber Smart Staff Are The First Line Of Defence

The City of London Police announced that they will be hiring a team of cyber detectives, amid growing concerns of cyber-attacks throughout London. While these detectives will no doubt be

Industry Insights

Security by Design – Security Risk Owners

This is the third part of a multi-part series on security program design. The previous article highlighted the security design process at a fairly high level. This iteration dives deeper

Mobile

3,000+ mobile apps leaking data from unsecured Firebase databases

Appthority published research on its discovery of a new HospitalGown threat variant that occurs when app developers fail to require authentication to Google Firebase databases. Appthority security researchers discovered the

Hardware/Network

Threat modeling: What’s all the buzz about?

Keen observers will have noted an uptick in activity around threat modeling within the information security community recently with new tools being released and strategies and methodologies being discussed on

Industry Insights

Security at the Speed of Business

Agile security at the speed of business is simply a concept where security is thought of as part of the design from end to end. Otherwise, systems must be patched,