The CSO Conference & Awards: A Brief History

Author(s):

CSO Brief History

The CSO Conference & Awards has evolved into a premier event for cybersecurity professionals and leaders. Formerly known as CSO50, this conference has a rich history of recognizing excellence and innovation in the field of cybersecurity. Origins and Evolution Welcome to the reimagined CSO Conference & Awards, fueled by a brand-new name and an expanded … Read more

Blockchain Technology: From Hype to The Future

Author(s):

Blockchain Technology

The mysterious blockchain technology. Well, it was mysterious. In fact, at one point, it was futuristic. And there was so much hype around it, yet so many differences, that nobody really trusted it. But what happened? Blockchain technology moved from hype to the future. It’s something most people know about, understand, and are interested in … Read more

Tools to Meet Tomorrow’s Mobile Cybersecurity Threats for Government

Author(s):

Brian Robison, VP of Product Marketing & Chief Evangelist, Corellium

Tools to Meet Tomorrow’s Mobile Cybersecurity Threats for Government

The quest for innovative solutions is relentless in an era where government agencies and service providers grapple with increasingly sophisticated cybersecurity challenges. One such solution that has emerged as a potent tool in mobile security is using virtual iPhones and Android phones for penetration testing and malware analysis. These virtualized environments have ushered in a … Read more

Account Takeover Fraud: Navigating the Treacherous Digital Waters

Author(s):

Ahmet Ocal, Platform Specialist, WhitePress

Account Takeover Fraud

In the bustling marketplace of online retail, where transactions occur at lightning speed and global boundaries blur, a silent guardian stands watch: eCommerce fraud prevention. This specialized armory, designed to combat the unique threats faced by online retailers, is instrumental in ensuring that the digital bazaar remains a haven of trust and reliability. The Guardian’s … Read more

The Importance of Jailbreaks for iOS Security Work

Author(s):

Anthony Ricco, Chief Marketing Officer, Corellium

The importance of jailbreaks for iOS security research

The realm of iOS security research has seen significant advancements in recent years. With each new iOS release, Apple tightens its grip on the operating system’s security. As a result, public jailbreaks have become increasingly rare. However, jailbreaks still play a critical role in iOS security work. The Significance of Jailbreaks in iOS Security Research … Read more

The Use of Generative AI in DevOps

Author(s):

Shigraf Aijaz, Cybersecurity Writer and Journalist,

Generative AI in DevOps

Generative AI has emerged as a transformative technology in DevOps that revolutionizes software development and operation processes. According to market research, the Generative AI in the DevOps market will surpass approximately $22 million by the end of 2023 and will likely reach a registered CAGR of 38.20% by 2032. By utilizing the power of advanced … Read more

6 Signs You Need to Improve Your Enterprise Security

Author(s):

Daisy Alina, Author, Animus webs

Enterprise Security

In an era where technology lies squarely at the heart of corporate operations, a defense against the pervasive threat of cybercrime is no longer optional but essential. The escalating complexity of cyber-attacks calls for a proactive, diligent response that leaves no stone unturned. But, as the urgency for protection escalates, do you fully grasp the … Read more

Left Shifting Mobile Security with DevSecOps

Author(s):

Steven Smiley, , Corellium

A mobile device on a black background with interconnecting points.

In today’s fast-paced digital world, organizations can no longer afford to overlook the importance of strong security measures when developing software. With the increasing frequency of cyber attacks targeting businesses of all sizes and industries, having a robust cybersecurity posture has become a necessity. To achieve this, companies must prioritize product-specific security and integrate it … Read more

Safeguarding Personal Identity Information: Protecting Your Devices at Home and on Mobile Phones

Author(s):

Karen Austin, CEO, United States Cybersecurity Magazine

Safeguarding Personal Identity

Introduction: In today’s digital age, protecting Personal Identity Information (PII) is more crucial than ever. With an increasing number of cyber threats, it is essential to take proactive measures to safeguard our personal data on devices at home and on mobile phones. This article aims to provide practical tips to help individuals protect their PII … Read more