Equifax Data Breach, Mobile Flaws, and More – Is There No End to the Blunders?

Equifax Data Breach, Mobile Flaws, and More – Is There No End to the Blunders?

You’ve probably heard about the recent hack of Equifax data – now that the company finally fessed up and made public the breach of some 183 million records from its systems. Equifax, as a reminder, is one of the three largest credit reporting agencies in the US, collecting confidential...

MWCA 2017 Highlight: Top 5 Security Risks for Connecting (and SECURING) the Americas

MWCA 2017 Highlight: Top 5 Security Risks for Connecting (and SECURING) the Americas

Mobile World Congress Americas (MWCA) 2017 just took place, with a plethora of current mobile products and solutions, and some tantalizing glimpses of future. The projections are for growth, growth, and more growth, either by equipping the mobile-less minority with mobile devices, or getting existing users to do even more with their mobiles, from controlling their toasters to managing networks of connected sensors.

WARNING: Use MWC Mobile App at Your Own Risk

WARNING: Use MWC Mobile App at Your Own Risk

As an attendee you would expect that a premier event such as MWC would take the appropriate measures to protect both itself and you, but they haven't. After leveraging our platform to rapidly analyze the MWC application we found multiple vulnerabilities that could put attendees at significant risk. What's worse is that one of the vulnerabilities has been around since 2012 and has been documented in at least nine different books (yes, nine) on mobile security and hacking mobile devices.

iOS, Android, Security, Privacy, and the Winner Is… Not Who You Think It Is!

iOS, Android, Security, Privacy, and the Winner Is… Not Who You Think It Is!

Check out each of these two mobile operating systems together with the keywords “security” and then “privacy” in your favorite search engine. It soon becomes clear how popular opinion stacks up for one versus the other. Yet recent results of tests of the top 100 apps for iOS and for Android could be a real eye-opener for many.

4 Reasons Why Machine Learning Is A Critical Component To Crowd-Sourced Security

4 Reasons Why Machine Learning Is A Critical Component To Crowd-Sourced Security

Collaborative and crowd-sourced security intelligence is on a path to disrupt traditional research firms, and the power of Machine Learning will become a big player to help these crowd-source platforms scale with the size and complexity of threat data in the market.

5X Mobile Security Productivity by Using Machine Learning to Combat The CyberSecurity Skills Shortage!

5X Mobile Security Productivity by Using Machine Learning to Combat The CyberSecurity Skills Shortage!

In the last few years it’s become nearly impossible for organizations to appropriately staff cybersecurity positions. According to Forbes, the market is looking at a global shortage of 2 million cybersecurity professionals by 2019, and that gap only looks to be increasing. One area where this is heavily felt is the 68% of companies that are increasing spending on mobile development, but have difficulty in filling the positions necessary to release safe and secure applications.

AI – A Mandatory Requirement for Mobile App Security!

AI – A Mandatory Requirement for Mobile App Security!

Even if cybercriminals haven’t quite cracked machine learning yet, honest developers and security testers should get onboard the AI train anyway. It may be the best thing for mobile security since the dawn of the mobile OS and the apps that run on it.

Webinar: Mi3 Security™ CTO, Ken Lloyd, Presents CMDSP

Webinar: Mi3 Security™ CTO, Ken Lloyd, Presents CMDSP

On August 10th Ken Lloyd, Chief Technical Officer and Co-Founder of Mi3 Security and board member for CMDSP (Credentialed Mobile Device Security Professionals) will explain the leading Enterprise Mobility Credential, CMDSP and discuss the latest mobile security technologies that impact the IT Mobile Administrator.