What Zero Trust means for mobile security?

Posted by Roxane Suau on March 16, 2020

The Zero Trust model, first identified by the research firm Forrester, is a security approach based on the principle of not trusting any network or data access request by default, even when it comes from inside the company perimeter. Zero Trust goes beyond the identity approach which focuses on only authenticating the user. It has emerged as the most reliable way for companies to keep away cyberthreats evolving within their distant and immediate environment.

 

Read More

SMS OTP Authentication: Not As Safe As You May Think

Posted by Roxane Suau on February 17, 2020

Most online transactions require a two-step authentication, and the One-Time-Password (OTP) sent by SMS is often one of those two steps. The purpose of an OTP is to prevent fraud by confirming that the person making the transaction and the credit card owner are one and the same. To do so, a temporary code is automatically sent by SMS to the phone number associated with the bank account used.

 

Read More

Pradeo Lab's cybersecurity predictions for 2020

Posted by The Pradeo Lab on January 17, 2020

 

The cybersecurity landscape is evolving at a fast pace. Hackers constantly sophisticate their attack techniques while security vendors push their technologies forward to keep warding threats off efficiently. Mobile security has become in the last couple years a major topic for security teams, as nearly all workforces now use mobile devices for work purpose. According to our team, here is what should be expected in 2020.

 

Read More

Mobile security event collection for SIEM software

Posted by Roxane Suau on December 18, 2019

Maintaining a safe digital framework can be a tricky task for large organizations’ IT teams. To help them, some solutions such as security information and event management (SIEM) softwares are specifically designed to group and analyze large amounts of data and make them comprehensible at a human scale. By relying on these capabilities, a SIEM can alert on suspicious and potentially illegitimate behaviors, providing security heads with visibility in a security context.

 

Read More

7 actionable tips to prevent breach from mobile devices

Posted by Roxane Suau on December 05, 2019

Mobile users are often unaware of how vulnerable their smartphone can be. A regular mobile usage involves manipulating numerous corporate and personal data, installing apps, granting permissions, connecting to various networks, etc. But while all these can seem innocuous, common tasks and habits such as delaying an update or side-downloading an app actually come with risks.

Read More