CIO
2.6K views | +0 today
Follow
Your new post is loading...
Your new post is loading...
Scooped by Pál Kerékfy
Scoop.it!

Five Mobile App Security Techniques Hackers Don’t Want You to Use – Itango.eu

Five Mobile App Security Techniques Hackers Don’t Want You to Use – Itango.eu | CIO | Scoop.it

Why are things different on mobile devices? First, these devices, and any sensitive data they contain, are more likely to be lost or stolen. Second, new attacks are emerging that exploit mobile devices. Malware can be installed on adjacent devices to extract sensitive information. Electronic eavesdropping can intercept data being sent wirelessly between apps and organizations. Hackers can also repackage apps, add malicious code to them, and then reload them to app stores — a tactic that has been prevalent with banking apps.Click here to edit the content

Pál Kerékfy's insight:

Azoknak a cégeknek, amelyek mobil alkalmazásokat fejlesztenek vagy használnak: 5 tanács a Gartnertől. Nem világmegváltó dolgok, de érdemes ezekre is gondolni.

#Gartner #security #CISO #mobile

more...
No comment yet.
Scooped by Pál Kerékfy
Scoop.it!

The battle of infrastructure is over, the battle of applications is about to begin

The battle of infrastructure is over, the battle of applications is about to begin | CIO | Scoop.it

IT groups will recognize that their struggle to meet the speed and functionality of the public providers is fruitless. More important, they will recognize that their major task is to deliver applications, and spending time agonizing over what infrastructure to use is useless

Pál Kerékfy's insight:

A valódi téma és feladat a nagyvállalati (és a kisebb) IT osztályok számára az alkalmazások (szoftverek) kiválasztása és biztosítása. Az infrastruktúra már nem megkülönböztető tényező a versenyben. A jó szoftver az lehet!

#cloud #infrastructure #application #advantage #enterprise

more...
No comment yet.