Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Mobile

Post-perimeter security 101: Dawn of a borderless world

The perimeter has disappeared. Employees work from anywhere in the world and their devices access corporate data from cloud services outside of traditional security perimeters. Securing data in the post-perimeter world requires organisations to enforce their endpoints and establish continuous conditional access to data based on risk. Aaron Cockerill, Chief Strategy Officer at Lookout discusses how to effectively shift security to your mobile endpoints to protect your company’s sensitive data.

What You Need to Know About Secure Mobile Messaging in Healthcare

With the majority of people using smartphones these days, texting is all but a given when trying to communicate with your friends or family. But what about your doctor? A recent study determined that 96 percent of physicians use text messaging for coordinating patient care. This can raise eyebrows and red flags.

New Release: ionCube24 App for iOS and Android

We are pleased to announce the release of the ionCube24 app for iOS and Android! With it, you can access ionCube24 wherever you are and monitor your site for performance and security issues. This is a big step forward for ionCube24 giving you ease of access for monitoring your website wherever you are. With notifications and in-app management options you can be aware of issues immediately and act fast. Take a look below to see what the ionCube24 app can do.

Cybersecurity Predictions: Your phone matters more than your password

The password may be one of the worst security elements we have. They are oftentimes easily guessed because we, as humans, are generally pretty bad at creating and remembering them. So, we use weak passwords across multiple accounts. We use simple passwords like “123456” or “password.” The industry is also yet to find something better. The phone, however, presents new and exciting ways for companies to protect their accounts, which means the phone is also become a critical part of the hacker “kill chain.”