Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

UK's automated self-check-outs using Age Verification API

Self-checkout kiosks are automated devices that enable consumers to scan and pay for their products without the help of a cashier. By this point, we’ve all encountered them. They are frequently seen at supermarkets, department shops, and other retail locations where it is possible to skip tedious manual check-out.

HIPAA Compliant Mobile App Development: Features, Risks and Checklists

The wide penetration of internet facilities has its imprint on almost all sectors, including the healthcare industry. With most people using smartphones, the demand for online applications is tremendously increasing. As a result, people are shifting towards tele-medication and treatment. However, every successful product has its drawback. Likewise, the popularity of healthcare applications has also captivated more security threats.

The Ultimate Security Checklist to Launch a Mobile App in Nigeria - iOS & Android

Nigerian authorities have made great strides in data security, and businesses worldwide are taking notice. If you're planning to launch a mobile app in Nigeria, it's crucial that you understand the importance of app security and take steps to ensure that your app meets Nigerian data privacy requirements. We’re aware that data protection can be overwhelming as it requires a holistic approach that incorporates legal, administrative, and technical safeguards.

Fireside Chat with Aon CSO Joe Martinez

In this fireside chat, Chief Security Officer Joe Martinez shares insights on how Aon approaches various technical and business issues in protecting the company’s business-critical assets. Salt Security executives Michael Nicosia, co-founder and COO, and Michelle McLean, VP of Marketing, ask Joe about far-ranging topics including: This webinar first aired on December 15, 2022.

Understanding the basics of Cloud Security: What is Zero Trust & Why does it Matter?

Cybersecurity professionals are tasked with the difficult job of protecting their organization's data from malicious actors. To achieve this goal, zero trust security has become an essential tool for organizations. But what exactly is zero trust? In this post, we’re going to separate signal and noise by disambiguating the term zero trust. We’ll talk about what it is, why it matters, and key takeaways you should have regarding the state of cybersecurity in 2023.

Trustwave Upgrades Fusion Platform Mobile App

Trustwave has updated its Fusion Platform mobile app, for Apple iOS or Android, adding a bundle of new features and enhancements designed to make monitoring an organization’s security status at any time or place even easier. The Trustwave Fusion platform is a cloud-based cybersecurity platform that serves as the foundation for Trustwave’s managed security services, products, and other cybersecurity offerings.

AI-generated phishing attacks are becoming more convincing

It's time for you and your colleagues to become more skeptical about what you read. That's a takeaway from a series of experiments undertaken using GPT-3 AI text-generating interfaces to create malicious messages designed to spear-phish, scam, harrass, and spread fake news. Experts at WithSecure have described their investigations into just how easy it is to automate the creation of credible yet malicious content at incredible speed.

The Heightened Importance of Cybersecurity in Mobile App Development

Mobile device use is pervasive, and has eclipsed traditional computing. We often hear how various malicious mobile apps are released into circulation. For these reasons, mobile app development needs to focus on cybersecurity just as much as it does on functionality and flexibility, if not more so. It’s an inevitable aspect of app development that must be taken more seriously, as the very real threats to business proliferate.

GCP FileStore Backup for Kubernetes Persistent Volume Data on GKE Clusters

Google Cloud Provider (GCP) Filestore is a good place to keep lots of rich, unstructured data, such as graphic designs, video editing files, and other media workflows that use files as input and output. Having GCP Filestore backups enables users to protect themselves against the rare case of inaccessibility, accidental changes, ransomware attacks, or other types of disasters.