Eduard PalomerasClient Services Consultant IMS Division, BroadcomPosted: 5 Sep, 20245 Min ReadBuilding Identity ResilienceHow will the EU’s Digital Operational Resiliency Act affect identity services? Building Identity Resilience
Yuanjing GuoSoftware EngineerPosted: 27 Aug, 20244 Min ReadUnveiling Mobile App Vulnerabilities: How Popular Apps Leak Sensitive DataA look at eight Android and iOS apps that fail to protect sensitive user data. Unveiling Mobile App Vulnerabilities: How Popular Apps Leak Sensitive Data
Arnaud TaddeiGlobal Security Strategist, Enterprise Security Group, BroadcomPosted: 21 Aug, 20243 Min ReadWhy the ITU Can Spearhead a Standards RenaissanceA world without standards will stunt the success of innovationWhy the ITU Can Spearhead a Standards Renaissance
Alisha SmithHead of Product Marketing, Enterprise Security Group at BroadcomPosted: 21 Aug, 20245 Min Read3 Steps to Win Quickly With Carbon Black App ControlStart fast and strong as you implement default/deny 3 Steps to Win Quickly With Carbon Black App Control
Threat Hunter TeamSymantecPosted: 20 Aug, 20242 Min ReadNew Backdoor Targeting Taiwan Employs Stealthy CommunicationsPreviously unseen backdoor communicates with command-and-control server using DNS traffic.New Backdoor Targeting Taiwan Employs Stealthy Communications