What have we learned about mobile security in 2020?

What have we learned about mobile security in 2020?

Whether we like it or not, it is now an established fact that mobile phones play a major role in our day-to-day life, and never has this been truer than in 2020. With opportunities for socializing and travel reduced, it has been a year of scrolling, messaging and...
Cybersecurity errors at Nakatomi

Cybersecurity errors at Nakatomi

Many families spend the holidays watching favorite movies together, in lots of cases the same ones year after year, making Christmas and New Year’s traditions. Some people love Christmas comedies, others favor melodramas. As for me, my favorite Christmas movie...
5 Key Challenges for IT Automation

5 Key Challenges for IT Automation

Automation offers huge potential for streamlining processes and increasing productivity, but it can be difficult to implement. However, if you understand the challenges involved in introducing an automation solution and prepare for them adequately, your organization...
How ITAM can close the door on asset vulnerabilities

How ITAM can close the door on asset vulnerabilities

Software either is or will be vulnerable. It’s rare that you won’t have to update out-of-date, unsupported or end-of-life software. If your job description involves software or IT asset management (SAM/ITAM), this is part of your day-to-day and nothing particularly...
How to Build a Mature Application Security Program

How to Build a Mature Application Security Program

Baking application security into the software development process is a major challenge that requires not only the right tools but also a mature development culture. This article shows the stages of building a mature AppSec program, as discussed by Netsparker founder...