From the Winter 2024 Issue

Mobile Security Research – A Massive Waste of Time

Author(s):

Brian Robison, VP of Product Marketing & Chief Evangelist, Corellium

Mobile Security Research

Mobile security research and testing have traditionally been extremely difficult and time-consuming endeavors. And most of that time is spent doing things other than the actual research. Whether searching for vulnerabilities in a mobile OS, penetration testing a mobile app, or conducting research into mobile threats and malware, all are bound by the restrictions imposed … Read more

From the Fall 2023 Issue

Building What’s Next: Empowering Developers for the Next Generation of Smart Devices

Author(s):

Anthony Ricco, Chief Marketing Officer, Corellium

Connected smart devices and IoT applications are arguably the most influential technology that is powering the 2020s. Smart phones, connected cars, and IoT devices have completely shifted how we interact with the world. Previously offline industries, like critical infrastructure, have also begun adopting smart devices to move their operations into the future. The adoption and … Read more

From the Summer 2023 Issue

Next-Gen Devices Require Next-Gen R&D

Author(s):

Anthony Ricco, Chief Marketing Officer, Corellium

When we hear the term “IoT”, we immediately think of innovation, cutting edge, or a new way of doing things. We think about home automation, computer vision, smart watches, and driverless cars. When you stop to consider the endless ways IoT has modernized daily life and business, it’s pretty astounding. So why then is the … Read more

From the Spring 2022 Issue

Shifting Our Thinking from Cybersecurity to Cyber Safety

Author(s):

Stephen Cardot, CEO, President, Founder, CloudCover

Our reactive, defensive approach to IT security isn’t working − proactive de-risking is the way forward. “Disconcertingly routine.” That’s how an article in a national news publication summed up the current cyber-attack landscape after the recent discovery that Chinese hackers had breached several governments and universities around the world in a years-long campaign to steal … Read more

From the Spring 2016 Issue

New Possibilities for Solving CYBERCRIME

Author(s):

-William J. "Bill" Britton, Vice President of Information Technology and Chief Information Officer, California Polytechnic State University

Combatting cybercrime is where we, as a society, find ourselves in uncharted territory.   The criminal of today does not rely on in-person interaction, but on the continually-shifting dynamics of the Internet. It is arguable that every crime involves some sort of cyber component, whether as its culminating element or an intermediary step. In either circumstance, … Read more

From the Spring 2016 Issue

Digital and Physical Security Converged: How to Achieve the Next Generation of Cyber Defense

Author(s):

Christopher Ensey, Chief Operating Officer, Dunbar Security Solutions

With more than 80 million related events occurring annually, cybersecurity is one of the biggest concerns for companies today.1 And since 55 percent of attacks in 2014 were carried out by insiders – actors with either physical or remote internal access to an organization’s systems – it is clear that cyber-attacks do not occur in … Read more

From the Spring 2016 Issue

Cyber-Physical Security for 3D Printing

Author(s):

Sharon Flank, Ph.D., CEO, InfraTrac, Inc.

Counterfeiting threatens profits, compromises brand reputation, and endangers customers. A fake bag or watch may seem like a harmless bargain, but buyers are often unaware that its profits fund organized crime or even terrorism. The dangers of counterfeit medical devices, airplane parts, and truck brakes are another matter entirely. The U.S. economy relies on intellectual … Read more

From the Spring 2016 Issue

Technology and the Tension between Security and Privacy

Author(s):

Connie Uthoff, Program Director, The George Washington University

At the Electronic Privacy Information Center (EPIC) Champions of Freedom event in June 2015, Apple CEO Tim Cook stated, “Like many of you, we at Apple reject the idea that our customers should have to make tradeoffs between privacy and security. We can and we must provide both in equal measure. We believe that people … Read more

From the Winter 2015 Issue

Next Generation Espionage

Author(s):

Daren Dunkel, Manager, Enterprise Sales, Amazon Web Services

As we enter the new year we approach the one year anniversary of the Target corporation hack. Their CEO is out of a job, their board of directors is being sued, and the brand has suffered, by some estimates, $1 billion in damages. Unfortunately the Target Corporation is not an isolated example. Recently the headlines, … Read more