Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Mobile

A CISO's View of Mobile Security Strategy, With Stacey Halota

100%
0%

CISO of Graham Holdings Stacey Halota visits Dark Reading News Desk at Black Hat to discuss her talk at the CISO Summit, why securing mobile devices is a top priority despite their absence in recent mega-breach story lines, and how her company is using mobile devices to improve security, instead of threaten it.

Comment  | 
Print  | 
Comments
Newest First  |  Oldest First  |  Threaded View
kaymera
50%
50%
kaymera,
User Rank: Apprentice
2/7/2018 | 4:14:26 AM
Not that difficult to hack a mobile device
We all have mobile devices and we are all connected. Everyone has email accounts, social media and access to their organization's email and their resources. If a hacker wanted to target someone or the organization, the best tool is the Mobile phone.

Most mobile phone users are really not aware of the cyber risks from downloading apps (without reviewing what access they are giving up), connecting to open WIFI networks at the cafe, airport, mall, etc... You might not even need a sophisticated attacking system to infect a mobile device, you just need to manipulate the user.

Everyone I know has a firewall or an antivirus software on their personal computer, however, most people do not have a Mobile Threat Defense app on their mobile phone. So it's important that a mobile phone user install a Mobile Threat Defense app such as the Kaymera CipherWatch app that will detect, prevent and protect the user /organization from mobile threats.
Black Hat Q&A: Hacking a '90s Sports Car
Black Hat Staff, ,  11/7/2019
The Cold Truth about Cyber Insurance
Chris Kennedy, CISO & VP Customer Success, AttackIQ,  11/7/2019
6 Small-Business Password Managers
Curtis Franklin Jr., Senior Editor at Dark Reading,  11/8/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2011-5271
PUBLISHED: 2019-11-12
Pacemaker before 1.1.6 configure script creates temporary files insecurely
CVE-2014-3599
PUBLISHED: 2019-11-12
HornetQ REST is vulnerable to XML External Entity due to insecure configuration of RestEasy
CVE-2014-7143
PUBLISHED: 2019-11-12
Python Twisted 14.0 trustRoot is not respected in HTTP client
CVE-2018-18819
PUBLISHED: 2019-11-12
A vulnerability in the web conference chat component of MiCollab, versions 7.3 PR6 (7.3.0.601) and earlier, and 8.0 (8.0.0.40) through 8.0 SP2 FP2 (8.0.2.202), and MiVoice Business Express versions 7.3 PR3 (7.3.1.302) and earlier, and 8.0 (8.0.0.40) through 8.0 SP2 FP1 (8.0.2.202), could allow creat...
CVE-2019-18658
PUBLISHED: 2019-11-12
In Helm 2.x before 2.15.2, commands that deal with loading a chart as a directory or packaging a chart provide an opportunity for a maliciously designed chart to include sensitive content such as /etc/passwd, or to execute a denial of service (DoS) via a special file such as /dev/urandom, via symlin...