Data Encryption Policy

The Data Encryption Policy’s purpose is to define for employees, computer users and IT department staff the encryption requirements to be used on all computer, device, desktop, laptop, server, network storage and storage area network disks, and drives that access or store organization information to prevent unauthorized access to organization communications, email, records, files, databases, …

Read More

Server Inventory Checklist

It’s important to maintain accurate infrastructure inventories to assist secure and effective network administration. A checklist, like the accompanying file from TechRepublic Premium, is an easy and efficient way to begin the process of maintaining accurate infrastructure inventories. From the checklist: DON’T FORGET ABOUT FORGOTTEN SYSTEMS It’s common for technical network audits to surface forgotten …

Read More
Black Hat 2023: Understanding Mobile Exploitation Beyond the App

Black Hat 2023: Understanding Mobile Exploitation Beyond the App

Unveiling the World of Mobile Exploitation: ARM Architecture and Beyond
Dinesh Shetty, Director, Security Engineering, Security Innovation
Mobile applications are the obvious target for cyber attacks, but a secure application won’t faze a committed cyber adversary. They can exploit any mobile interface—an app, calls to the OS, and background operations. From there, they can easily go after anything they want.

Read More
X