Articles by

Protecting the Mobile Ecosystem: Risks & Security Measures

Mobile apps are more interconnected than ever, creating hidden security risks that users and businesses often overlook. In this deep-dive discussion, Ilya Dreytser explores the dangers of app collusion, where apps secretly share permissions, and unknown app risks that compromise user privacy and security. Learn how ad networks, SDK vulnerabilities, and permission mismanagement expose sensitive data—and what you can do to protect your device and mobile ecosystem. Watch now to secure your apps and data!

Read More »

CISA Secure by Design intro

The cybersecurity landscape is evolving, and CISAs “Secure by Design” initiative aims to shift the burden of security from users to technology manufacturers. In this webinar, Bob Lord, Senior Technical Advisor and Jack Cable, Senior Technical Advisor discuss the importance of integrating security at the design phase, eliminating vulnerabilities before they reach customers, and promoting transparency in software development. Learn how this approach can reduce cyber risks, protect businesses, and create safer digital ecosystems. Watch now!

Read More »

CISA’s Federal Enterprise Operations Cyber Alignment Plan

Ensuring a unified cybersecurity strategy across federal agencies is crucial. This report outlines CISA’s plan to enhance cyber resilience, streamline operations, and strengthen defenses against evolving threats. Learn how this initiative aligns federal cybersecurity efforts to protect critical infrastructure. Download now for key insights.

Read More »

Protecting The Mobile Ecosystem – Part 1

How can we truly protect the mobile ecosystem in an era of evolving threats? In this expert-led discussion, Quokka.io founder and Head of Sale, Simon, and Ilya Dreytser from Quokka delves into the complexities of mobile security—covering device vulnerabilities, app security, and user data protection. Learn how governments, businesses, and individuals can safeguard their data while navigating supply chain risks, BYOD policies, and regulatory challenges. Stay ahead of emerging mobile threats—watch now!

Read More »

NIST SP 1800-22: Mobile Device Security

Mobile devices are critical to modern business, but they also introduce security risks. The National Institute of Standards and Technology (NIST) SP 1800-22 Cybersecurity Practice Guide offers practical solutions for securing mobile devices in enterprise settings. Download now for industry-backed best practices.

Read More »