Mobile platforms operate under fundamentally different trust assumptions than we relied on for web security. Your mobile ...
Forbes contributors publish independent expert analyses and insights. Steve Weisman writes about white-collar crime. In August 2021, hackers offered for sale on the Dark Web data of what they said was ...
The European Commission is investigating a data breach that compromised the infrastructure used to manage mobile devices, which leaked the staff members’ personal information.
Washington state has sued T-Mobile over failing to secure the sensitive personal information of over 2 million Washington residents in a 2021 data breach. The case dates back to August 2021, when ...
Several mental health mobile apps with millions of downloads on Google Play contain security vulnerabilities that could expose users' sensitive medical information.
In the rapidly evolving cybersecurity landscape, data security posture management (DSPM) has emerged as a critical component for enterprises in just a few years. As a co-founder of a DSPM with ...
CRN’s Security 100 list of the coolest identity, access and data security companies includes vendors in segments such as identity and access management, security service edge and AI-powered data ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results