Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Mobile

Vodafone Bundles Lookout with Google Workspace to Protect Small Businesses

Even before working from anywhere became the norm, organizations of every size were already becoming more reliant on mobile devices and productivity apps. But this reliance has also opened users, devices and data up to more risk. This is why we are thrilled to see our friends at Vodafone offering a new bundle for small businesses that brings together Lookout for Small Business mobile security and Google Workspace, a suite of collaboration and productivity apps by Google.

Lookout contributes to 2022 Verizon MSI With Mobile and Cloud Security Insights

One of the best ways to stay up to date on how mobile devices affect your organization's security is by reading the Mobile Security Index (MSI) by Verizon. Lookout is a long-time contributor to the report, including the 2022 edition that was just published. This year’s MSI is especially interesting, as it dives deeper into the interconnectivity that now exists between endpoint devices and cloud applications.

Higher Ed Campuses Have Digitized: Protecting Sensitive Data Requires a Unified Approach

Higher education institutions have long been subjected to ransomware and other cyber attacks, which has had a huge impact on their operations. In 2020 alone, ransomware attacks affected nearly 1,700 U.S. schools, colleges and universities – which is an increase of 100% over the previous year. The average cost of these attacks were $2.73 million in downtime, repairs and lost opportunities.

Difference Between Black-Box Testing & White-Box Testing

A developer goes through different development and deployment rules for creating applications. Testing is an essential step in the development cycle. When it comes to software testing, many techniques need to be used from time to time. Yet the confusion around white, grey, and black testing techniques are most common among all software testing techniques. They often appear similar, yet the differences between them are very jarring.

9 Best Security Practices for E-Commerce App Developers

Smartphones have become a central part of our lives, surpassing the popularity of desktops and laptops. That's why brands and companies these days need to take on a mobile approach when designing and creating applications. Why? Because an overwhelming number of mobile users spend their time these days on mobile apps. Therefore, it's crucial to consider the security of your mobile app. That way, all your sensitive data is safe and secure.

More malware-infested apps found in the Google Play store

Three million Android users may have lost money and had their devices infected by spyware, after the discovery that the official Google Play store has been distributing apps infected by a new family of malware. French security researcher Maxime Ingrao described last week on Twitter how he had discovered the new malware, named “Autolycos”, and how it signs up users to premium services.

Compounding Complexities: Keeping Current in a Changing Cybersecurity Landscape

On the latest episode of the Security Soapbox podcast, I spoke with Ramy Houssaini, Chief Cyber and Technology Risk Officer at BNP Paribas, about the challenges Chief Information Security Officers (CISOs) face in an increasingly complex digital landscape. Change happens quickly in the cloud, and many organizations are faced with the issue of evolving their security strategy at the same pace. This ends up leaving sensitive apps and data vulnerable to cyberattacks.

Protecting Sensitive and Regulated Data in University and Government Healthcare Systems Requires a Unified Approach

Cyberattacks targeting university and government healthcare facilities are on the rise. In the first four months of 2021, the U.S. Department of Health and Human Services’ Health Sector Cybersecurity Coordination Center tracked a total of 82 ransomware incidents targeting the healthcare sector, with nearly 60% of them affecting the U.S. market. The impact has been devastating.

4 Misconceptions about SAST for Mobile

SAST is one of the matured security testing methods. In the SAST, the source code is examined from the inside out while components are in a static position. It performs scanning in-house code and design to identify flaws that are reflective of weaknesses, and that could invite security vulnerabilities. The scans performed by SAST tools are dependent upon prior identification of rules that specify coding errors to examine and address.

Appknox Webinar: Introduction to Reverse Engineering

About The Webinar: The cybersecurity landscape is constantly evolving, making it a challenge to stay ahead of attackers. They are always looking to exploit & gain access to control sensitive information. This can lead to serious consequences, such as ransomware attacks. This means integrating security as a core part of the development process is becoming even more essential by the day.