Alastair Paterson, CEO and Co-Founder, Digital Shadows highlights the rising danger of apps as mobile devices and applications are highly lucrative and viable targets to threat actors. I’ll venture to guess you’re using a mobile device to read this. In a recent Ericsson Mobility Report, the total number of mobile subscriptionsRead More…

Guest written by Matthew Gardiner, Senior Product Marketing Manager, Mimecast Most people live under the assumption that email is immutable once delivered, like a physical letter.  A new email exploit, dubbed ROPEMAKER by Mimecast’s research team, turns that assumption on its head, undermining the security and non-repudiation of email; even forRead More…

Guest written by: John Hathaway, Regional Sales Director, Middle East, BeyondTrust Privileged password management, sometimes called enterprise password management, refers to the practice and technique of securely controlling credentials for privileged accounts, services, systems, applications, and more. But unfortunately, with so much power inherent in privileged credentials, they are ripeRead More…