By Scott Lindley, General Manager, Farpointe Data The ability to use mobile phones as access credentials is one of the biggest trends in a market that historically has been slow in adopting new technology. As a matter of fact, research analyst Gartner has predicted that, by 2020, one in five […]

Why Mobile Access Is More Secure than Card Systems


Arkose Labs analyzed over 1.2 billion transactions across the financial services, e-commerce, travel, social media, gaming and entertainment industries, highlighting key trends Social media sites have become lucrative targets for criminals looking for quick monetization. To gain some additional insights into this phenomenon, we spoke with Vanita Pandey, VP Strategy […]

More Than Half of Logins on Social Media Platforms are ...


One of the scariest things about online scams is their impact on enormous segments of the population. The victims often deal with reputational damage and expenses associated with recovering from the attack and improving their current computer security practices to reduce the chances of something happening again. Anyone needing a […]

Cofense Labs Uncovers Large Scam Targeting Millions


Recently the well-known provider of service assurance, cybersecurity, and business intelligence solutions, NETSCOUT Systems Inc, released its semi-annual Threat Intelligence Report highlighting cybercrime as a mainstream business model. The report also examines the maturation of Nation-State sponsored Advanced Persistent Threat (ATP) groups and new findings on IoT vulnerabilities. With a […]

New Report Highlights Cybercrime Innovation



TrackTik Software’s mobile and web-friendly guard tour system uses automation to take the effectiveness and efficiency of an organization’s security management operations to the next level.  This first-of-its-kind system provides security managers with a custom-tailored, holistic view of their operations and security personnel on tour with the support and safety of having “a coach in their […]

TrackTik Software Offers Breakthrough Automation for Security Workforce Management


Deep Learning Proves Key to Detecting Known and Unknown Threats Hiding in Encrypted Web, Network Communications Blue Hexagon, a deep learning and cybersecurity pioneer, announced an industry-first ability to detect and stop–in real-time–both known and unknown threats hidden within encrypted SSL traffic. On the heels of this announcement, Brilliance Security […]

When You Live and Die by the 1-Second Rule


By Matthias Völkl, Cherry, Vice President Business Unit Office & Security Did you know that 87 percent of companies rely on employees having access to mobile business apps from their personal smartphones? It wasn’t so long ago that employers issued the same computer equipment to each employee — regardless of work […]

6 Facts You Should Know About the Future of BYOD


New findings from Cequence Security’ CQ Prime research team uncovers the use of Bulletproof Proxy networks by bad actors to automated bot attacks against web applications. “Bulletproof Proxies: The Evolving Cybercriminal Infrastructure” details how bulletproof proxy providers include millions of globally distributed IP addresses that are marketed under the guise of legitimate […]

Bulletproof Proxy Networks Target Retail and Financial Web Applications, Mobile ...



For various reasons, governments around the world are taking steps to direct and manage the use of the internet within their borders. Geopolitical situations and apprehension about data privacy give way to restrictions for commerce and civilian internet use. In most cases, actions to restrict access to the global internet […]

Dark Consequences: Former NSA operative presents an eye-opening report


The report examines the state of crowdsourced security In September of 2017, the consumer credit reporting agency Equifax announced a data breach that affected over 140 million people. The breach cost the company a blow to its reputation and billions of dollars in settlements. It was an exploitation of a […]

Bugcrowd’s Priority One Report 2019 Edition Now Available


Tel Aviv, Israel, July 30, 2019 – Perimeter 81, a pioneer in zero trust software-defined network access, has partnered with SentinelOne, the autonomous endpoint protection company. The partnership will provide a wide range of businesses, from midsize companies to Fortune 500s, with unified network and endpoint security, ensuring more effective threat defense for the […]

Perimeter 81 Partners with SentinelOne to Deliver Fully Automated, Zero ...


Major update offers security teams higher video stream density as well as reduced cost per desktop and video stream resulting in lower TCO and improved situational awareness Austin, Texas, July 24, 2019 — Pivot3, a leading provider of intelligent infrastructure solutions, today announced the Virtual Security Operations Center (Virtual SOC), designed to address the […]

Pivot3 Delivers Secure, Real Time Access and Control to Mission-Critical ...