article thumbnail

How to Build a Mobile-First Security Strategy

Ivanti

Kern Smith, vice president of global sales engineering for Zimperium, painted a clear picture of the emerging threats from mobile devices — as well as five clear principles of a mobile-first security strategy to mitigate those threats — at Ivanti Solutions Summit 2024 in Dallas in April.

Mobile 49
article thumbnail

Even North Korea has an antivirus program—but it’s used for spying

The Parallax

Researchers announced on May 1 that when they inspected the ingredients of the North Korean antivirus software for Windows computers, they found a mix of spyware and old code stolen from an antivirus vendor. to the journalist Martyn Williams , who specializes in reporting on North Korean technology.

Spyware 187
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Technology Context From the Verizon Data Breach Investigations Report (DBIR)

CTOvision

The information in the report can help drive strategic planning for enterprise technologists and members of the enterprise cyber security team and it is well worth a read by any CTO, CIO, CISO and most other members of enterprise technology teams. Background: - The point of this report is to support evidence-based risk management.

Report 124
article thumbnail

What is Tailgating in Cyber Security

The Crazy Programmer

Therefore, it is considered a social engineering cyberattack as it is always an electronic component. It is an information technology technique similar to phishing and built to fool people. They may even install spyware in the computer devices of the organizations. How Does Tailgating Work?

Spyware 162
article thumbnail

Fed Tech News Roundup

CTOvision

The following are some of the hot topics in the federal technology ecosystem: Senate advances secret plan forcing Internet services to report terror activity Ars Technica (Today) - Legislation modeled on 2008 law requiring Internet companies to report child porn.The legislation, approved 15-0 in a closed-door hearing, remains "classified."

Spyware 114
article thumbnail

Forget the Rules, Listen to the Data

Hu's Place - HitachiVantara

DataOps is required to engineer and prepare the data so that the machine learning algorithms can be efficient and effective. In the past 10 years the incidents of fraud have escalated thanks to new technologies, like mobile, that have been adopted by banks to better serve their customers. This is where DataOps comes into play.

Data 90
article thumbnail

9 Types of Phishing and Ransomware Attacks—And How to Identify Them

Ivanti

is a social engineering tactic that uses deception to steal an end user’s credentials and other personal information. against known and zero-day vulnerabilities, zero-click exploit kits developed by the NSO Group, fileless malware and the adoption of the “as-a-service” business model. What is phishing? Combating phishing and ransomware.