Zoom: The anatomy of vulnerability detection and response – Zoom’s recent vulnerabilities enabled potential attackers an easy way to gain access to users’ computers by remotely taking over their computer webcams and initiating video-enabled calls on devices without user consent.
Are Your Mobile Users Protected? With the vast amount of corporate and personal data on smartphones and tablets today, mobile devices have quickly become attractive targets for cybercrime. As attacks increase year over year, how do you protect the security of mobile users on your network? Keeping mobile users safe and networks secure are critical […]