Virtualization Is Transforming Mobile Security Research: Here’s How

Author(s):

Anthony Ricco, Chief Marketing Officer, Corellium

Mobile Security

The Internet of Things (IoT) is taking mobile security research by storm. According to market research firm Statista, the number of IoT devices worldwide is forecast to include more than 29 billion IoT devices by 2030. Consumer internet and media devices like smartphones and smartwatches are expected to make up 17 billion of these devices, … Read more

Best Identity and Access Management (IAM) Practices for DevSecOps

Author(s):

Shigraf Aijaz, Cybersecurity Writer and Journalist,

Best IAM Practices

Humans have long been the weakest link in an organization’s cybersecurity infrastructure. Statistics reveal that human errors such as misconfigurations, secret leakage, and bad data hygiene cause 95% of data breaches. Hackers rarely find their way into a system through brute force attacks; in fact, the most commonly known strategy is phishing attacks that help … Read more

Fixing Vulnerabilities at Speed—How Engineering and Security Can Achieve True DevSecOps

Author(s):

Jay Paz, Senior Director of Delivery, Cobalt

Engineering and Security

What happens when two distinct teams with varied technological expertise, different incentive structures and contrasting priorities converge?—the answer is usually tension. During a recent discussion with colleagues, a completely different result was experienced. ‘Camaraderie’ is the word that immediately comes to mind when thinking about the veteran DevSecOps/engineering and security leaders. Sure there are still … Read more