5G is a big leap in mobile technology. It presents enterprises and service providers with capabilities for advanced applications, content delivery and digital engagement anywhere. It enables businesses with new…
Browsing CategoryMobile Security
IAM Secures the New, Perimeter-less Reality
Necessity may be the mother of invention, and it also drives change. To remain competitive in 2021, companies had to transform rapidly. Today, many of us work from home. Remote…
Will the Metaverse Usher in a Universe of Security Challenges?
How much do you know about the metaverse? Everyone started talking about the metaverse in the summer of 2021. Facebook CEO Mark Zuckerberg kicked it off with his plan to…
The Most Important Security Takeaway from the October Facebook Outage
The massive October 4th Facebook outage was not due to a breach and was not classified as a security issue. But the fact that it went down — and…
Cyber Warfare: What To Expect in 2022
Cyberwarfare is not a future threat—it’s a clear and present danger. While the concept of cyber terrorism might sound like something from a fictional movie, our interconnected world is riddled…
It’s Not Too Soon to Start Talking About 6G
We may be only a short time into 5G deployments, but discussions of the impact 6G technology will have on our lives have already started. In late 2020, the Alliance…
Starting From Scratch: How to Build a Small Business Cybersecurity Program
When you run a small business, outsourcing for services like IT and security makes a lot of sense. While you might not have the budget for a full-time professional on…
BrazKing Android Malware Upgraded and Targeting Brazilian Banks
Nethanella Messer and James Kilner contributed to the technical editing of this blog. IBM Trusteer researchers continually analyze financial fraud attacks in the online realms. In recent research into mobile…
Remote Work Security: Handling Setbacks in the Time of COVID-19
Most security experts, IT workers and leaders understand that the pandemic brought a decline in business and digital safety. A big part of that is the rush to get set…
Cybersecurity Training: Why You Should Train Employees on Social Media Discretion
A few years ago, I was invited on a behind-the-scenes tour of the security operations of a well-known Las Vegas casino. Before we could enter, however, we had to turn…