Rethinking cybersecurity becomes imperative as devices and apps move away from physical offices

69.1% of professionals with security responsibility believe a rethink is needed to deal with the threat of cybersecurity now that devices and applications have moved outside the corporate network, a SentryBay survey reveals. The poll aimed to assess at… Continue reading Rethinking cybersecurity becomes imperative as devices and apps move away from physical offices

How to thwart SIM swapping attacks?

SIM swapping attacks have been reported in the media since 2017. Such attacks usually target banking transactions but not only. These attacks are also perpetrated against the cryptocurrency community, social media and email accounts. With the ENISA Rep… Continue reading How to thwart SIM swapping attacks?

The six most common threats against the device that knows you best

What is the most intimate relationship in your life—aside from your partner, your children or your parents? For many of us, it’s our mobile phone. It’s the last thing we see before sleep, and it’s usually the first thing in our hands each morning… Continue reading The six most common threats against the device that knows you best

EU Commission takes on challenge to improve the cybersecurity of wireless devices

The European Commission has taken action to improve the cybersecurity of wireless devices available on the European market. As mobile phones, smart watches, fitness trackers and wireless toys are more and more present in our everyday life, cyber threat… Continue reading EU Commission takes on challenge to improve the cybersecurity of wireless devices

Android data sharing remains significant, no opt-out available to users

An in-depth analysis of a range of popular Android mobile phones has revealed significant data collection and sharing, including with third parties, with no opt-out available to users. Prof. Doug Leith at Trinity College Dublin along with Dr Paul Patra… Continue reading Android data sharing remains significant, no opt-out available to users

Box, Zoom chief product officers discuss how the changing workplace drove their latest collaboration

Their newest collaboration is the Box app for Zoom, a new type of in-product integration that allows users to bring apps into a Zoom meeting to provide the full Box experience. Continue reading Box, Zoom chief product officers discuss how the changing workplace drove their latest collaboration

CPaaS market to exceed $5 billion in 2021

Data from Synergy Research Group shows the CPaaS market continues to demonstrate strong market growth. This momentum provides a solid foundation for increased development of communication and software technologies, creating and enhancing new customer i… Continue reading CPaaS market to exceed $5 billion in 2021

Microsoft is discontinuing its Office apps for Chromebook users in favor of web versions 

Since 2017, Microsoft has offered its Office suite to Chromebook users via the Google Play store, but that is set to come to an end in a few short weeks. As of Sept. 18, Microsoft is discontinuing support for Office, which includes Word, Excel, PowerPoint, OneNote and Outlook, on Chromebook. Microsoft is not, however, abandoning […] Continue reading Microsoft is discontinuing its Office apps for Chromebook users in favor of web versions 

62% of consumers believe hyperscale computing will have a positive impact over the next five years

A majority of consumers believe hyperconnectivity driven by hyperscale computing will positively impact them within five years, according to a report from Cadence Design Systems. The survey was conducted to determine consumer awareness and impressions … Continue reading 62% of consumers believe hyperscale computing will have a positive impact over the next five years

How do I select a mobile threat defense solution for my business?

In an almost exclusively mobile world and the increased usage of mobile devices to access corporate data, cybercriminals started taking advantage of the vulnerability of such devices. As a result, cyberattacks on mobile devices have skyrocketed. To sel… Continue reading How do I select a mobile threat defense solution for my business?