Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

May 2022

Top 5 E-Commerce Cybersecurity Trends For 2022 That You Need To Know

Cyberattacks on e-commerce sites are always a frequent phenomenon. Every e-commerce retailer wants to improve the consumer experience, but if they're not careful, their efforts could transform their business website into a playground for cybercriminals. Without a doubt, they are gold mines of personal and financial information for threat actors. And as a result, companies worldwide are losing billions to e-commerce fraud (more than 20$ billion in 2021).

Cybersecurity Compliance and Regulations in South Africa: What Businesses Need to Know

With the Internet's widespread growth, South Africa has become quite dependent on it for economic affairs. This sharing of self-generated data is a boon to all business transactions and even social interactions. The increased dependence on the digital world raises significant concerns about cyber security. Cybercrime is a global problem that has affected South Africa, both in the private sector and in government.

Digicel Deploys Enea AdaptiveMobile Security to Protect Mobile Networks in 26 Caribbean and Central American Markets

Enea the world leader in mobile network security, today announced that Digicel Group has deployed Enea AdaptiveMobile Security's comprehensive signaling security solution to protect mobile networks and subscribers in 26 markets across the Caribbean and Central American region.

Mobile Application Development Checklist: What You Need to Consider

An increase in the usage of the internet has also increased mobile phone usage. Mobile phones have become handy devices that make our life easy. This mobile phone contains various applications used for different purposes from entertainment, games, social media to banking, education, health, etc. Millions of applications are already available in the internet world, so it is not an easy task to develop a successful app.

Critical Capabilities for SSE: Securing Cloud Usage When Shadow IT is the Norm

With the release of the 2022 Gartner® Magic Quadrant™ for Security Service Edge (SSE) there is an abundance of information on the newest framework created to address security requirements in a cloud-first world. SSE was introduced in 2021 to refine Secure Access Service Edge (SASE) by focusing on the convergence of security capabilities within the framework. Check out my blog breaking down SSE and SASE for a more in depth explanation.

Top 10 Mobile App Security Questions Answered

With the rise of internet penetration and increased mobile usage, the significance of mobile applications has increased multifold. Everything is covered through mobile applications, from mundane day-to-day activities to high-end financial transactions. According to Techjury, there are 10 billion mobile devices currently in use, and a staggering more than 51% of people in the USA spend their time on mobile phones.

How to Secure Mobile Apps: A Complete Checklist for 2022

Full-fledged security is what every one needs! Due to the significant rise in cyber and malware attacks on the different apps, mobile app security is considered a critical component of app development. Therefore, having a highly secured mobile app ensures a hassle-free business operation! Whether your device is for professional or personal use, you need to protect a heap of data that you've stored.

Mobile App Security & Google's Data Safety Launch - Yay or Nay?

Internet and software giant Google recently recalibrated how it categorizes its Playstore apps. Google's Android applications are tagged with 'nutrition labels' based on the security practices and the data they collect from users to share with third parties. The recently announced Google Play's Data Safety section goes into action from July 20th.

Can SIM Cards Get Hacked?

‍Yes, even basic technology like SIM cards poses the risk of getting hacked. Today, cell phones have almost become tiny supercomputers, so users must learn how to secure their mobile phones. From social engineering scams to SIM hijacking, sensitive data can easily become compromised without adequate cybersecurity awareness. Learn more about why SIM card hacking is on the rise and how you can prevent it from happening.

What is DLP (Data Loss Prevention)? - DLP Solutions from Lookout

Data loss prevention (DLP) involves a set of technologies and processes used to discover, monitor and control sensitive data. Why is it so important? Businesses use DLP to prevent data breaches and comply with regulations such as GDPR, HIPAA, PCI DSS, and others. DLP tools allow security staff and network administrators to set business rules that determine what’s sensitive while also providing insight into the use of content within an enterprise.