Blog

RSA 2018: Topics You Shouldn't Miss

RSA 2018: Topics You Shouldn't Miss

Now a full quarter into 2018 we can begin to take a look at what 2018 will define in terms of security, and what we're seeing is a lot of focus on mobile security, applications security, IoT security, and broader challenges with data privacy, regulation and theft.

Fittingly, the RSA conference is now just two weeks away, and it's covering some absolutely great topics that you shouldn't miss.

Facebook: Russia and The Malicious Network Effect?

Facebook: Russia and The Malicious Network Effect?

We're seeing the real-time effects play out in the trifecta of Facebook, Russian election meddling and deep data exfiltration by the likes of Cambridge Analytica. The result isn't a hacked mobile application, or a server with a backdoor trojan installed, but rather a perturbation of social activity to incite anger, fear, and potentially even violence in the network constituents.

IN-THE-KNOW: Top 5 Articles from the last 14 days.

IN-THE-KNOW: Top 5 Articles from the last 14 days.

iOS 11 (including iPhone X) devices can now be unlocked by US defence contractor Cellebrite. While iOS is getting less secure, Android P is amping up security to prevent snooping on users and what apps can do in the background. Mobile banking and crypto trojans up 70% in 2017 according to McAfee, with a general total of 468,837 malware identifications according to Trend Micro. Lastly, RedDrop malware that is infecting at least 53 apps steals sensitive PII. Ouch.

Smart Homes - Inadequate Security?

Smart Homes - Inadequate Security?

The rise of Alexa, Siri and Google Home make it easy to say commands to unlock your door, or turn on your television and set your lights to 50% brightness.  However, this convenience factor presents a new and unique risk to the security posture of your home.

IoT: The Internet of Threat

IoT: The Internet of Threat

The Internet of Things (IOT) sector has seen explosive growth over the last 10 years.  The Internet of Things was roughly ‘born’ in 2008/2009, and first added to the Gartner “hype cycle” in 2011.  In this time we have seen not only an exponential growth in the number and types of connected devices with over 8 billion connected devices, but also a rise in the risk this presents to organizations and their user’s privacy and security.

Mobile Devices Driving the Future of Authentication

Mobile Devices Driving the Future of Authentication

One of the critical elements of the Internet economy is the act of validation or authenticating users.  Whether it is to log in to your banking, email, social media or other services, you are required to authenticate to the system or device. Fingerprints and facial scanning are just starting to scratch the surface on what can be detected and measured that is unique to you.