The Challenge of Securing Health Data in a Mobile-First Society

Posted by Roxane Suau on August 08, 2019

Mobility keeps growing in the healthcare industry and professionals increasingly receive, store, manipulate and transmit patients clinical information using mobile devices.

Each smartphone, tablet, and application is an access-point to hospitals, laboratories, etc. systems information, weakening the safety of sensitive data it manipulates.

Read More

OWASP vulnerabilities: When mobile applications can’t withstand attacks

Posted by Roxane Suau on August 05, 2019

Mobile apps are now on top of our digital consumption and they process data from millions of users all around the globe every day. The growing request of renewal and immediacy pushes organizations to create applications at a very fast pace, leaving behind the security tests.

 

Read More

Mobile applications: How to reduce fraud and increase trust

Posted by Roxane Suau on August 05, 2019

Applications have won mobile, that’s no longer news. As most organizations leverage mobile apps to enhance their users’ online experience, the whole mobile ecosystem is evolving accordingly. Cybercriminals and greedy individuals see in applications a surface to make money out of. Governments see in this surface a big risk for data privacy. Users trust in companies’ capacity to keep their information safe.

Read More

Why Updating Mobile OS And Application Is So Important

Posted by Roxane Suau on August 05, 2019

System and application updates always seem to pop up at less than timely moments, and most of us postpone them without second thoughts, for days, weeks, months… However, these updates represent an essential piece of systems’ stability and safety, as they include functionality enhancements and patches to security holes.

 

Read More

Pradeo streamlines Mobile Threat Intelligence with a brand-new line of services for security professionals

Posted by Roxane Suau on July 10, 2019

Official Press Release here.

Pradeo’s new mobile threat intelligence services provide deep and accurate insights on mobile threats, offering companies visibility on the mobile environment, thus enabling effective counter-threat responses.

Read More