Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Publications

The Spectrum of Mobile Risk

The time has come for enterprise risk management to change. Mobile devices have become core to our personal and professional lives, yet most enterprises remain focused on traditional PC endpoints. Although many of the same elements of risk that affect PCs also apply to mobile endpoints, simply extending current PC security controls to your mobile fleet is ineffective. Enterprise risk management needs to evolve to address mobile risks, and security professionals must architect mobile-specific security.

Why proactive mobile app defense is a must-have for financial services

Consumer financial institutions are in the midst of a digital transformation that includes moving traditional face-to-face customer interactions to mobile devices. Forty-three percent of people who own a mobile device and have a bank account use mobile banking, according to a Federal Reserve study titled, "Consumers and Mobile Financial Services." Mobile banking creates unprecedented conveniences for customers, such as mobile check deposits, near-instant person-to-person transfers, and access to personal financial accounts in real time.

Everything You Need to Know About the Evolving Bot Landscape

In 2019 we saw more credential stuffing, sniper and scraper bot attacks targeting websites, mobile apps and APIs alike. The shift in attack vectors and scale of attacks highlights an urgent need for a sophisticated solution that protects businesses and customers from the growing malicious bot threat. Understanding the intent of bad bots vs. humans or good bots is vital as all industries face new challenges in acquiring the necessary visibility of their traffic, and subsequent analysis required for rapid and effective attack response that doesn't sacrifice the user experience.

3 Steps to Better Bot Management

Are you seeing the full picture when it comes to web and application security? Without fast and accurate data at your fingertips from the best bot management, it's increasingly difficult to differentiate human from automated bot traffic on your web-facing applications. Credential stuffing, account fraud and scraping attacks are a multi-billion-dollar business¹, with the scope for earning made increasingly simple by the vast number of internet users, availability of login credentials and the sheer volume of connected devices.

DIY Guide to Open Source Vulnerability Management

You've realized you need to do a better job of tracking and managing your open source as well as the vulnerabilities and licenses associated with it. How hard can vulnerability management be? Do you really need special tools? After all, the license and vulnerability information is publicly available. Once you get a list of open source components and do some Google searching, you should be all set, right?