“We’ve just traced the attack... its coming from inside the house!” How do you secure your network when the bad guys already have control of your servers? It’s so hard to keep up with the attacks, maybe it’s safer to architect with the assumption that you’ve already been breached. What does this entail?
Thursday, June 27, 2019
Thursday, June 13, 2019
F5 Labs: What To Do When Your Company Tells You They're Making a Mobile App, Part 2
In part 2 of our mobile app strategy, we lay out the mobile security requirements including specifics on authentication, storage, communication, operations and cryptography.
What To Do When Your Company Tells You They're Making a Mobile App, Part 2
https://www.f5.com/labs/articles/cisotociso/what-to-do-when-your-company-tells-you-they-re-making-a-mobile-app-part-2
What To Do When Your Company Tells You They're Making a Mobile App, Part 2
https://www.f5.com/labs/articles/cisotociso/what-to-do-when-your-company-tells-you-they-re-making-a-mobile-app-part-2
Friday, June 7, 2019
F5 Labs: What To Do When Your Company Tells You They're Making a Mobile App, Part 1
What To Do When Your Company Tells You They're Making a Mobile App, Part 1
Lots of organizations are spinning up mobile applications to either directly or indirectly support their mission. We in the security field know that this is fraught with peril, but what do we do and where do we begin to manage the risk?
https://www.f5.com/labs/articles/cisotociso/what-to-do-when-your-company-tells-you-they-re-making-a-mobile-a
Subscribe to:
Posts (Atom)