CISA Secure by Design intro

The cybersecurity landscape is evolving, and CISAs “Secure by Design” initiative aims to shift the burden of security from users to technology manufacturers. In this webinar, Bob Lord, Senior Technical Advisor and Jack Cable, Senior Technical Advisor discuss the importance of integrating security at the design phase, eliminating vulnerabilities before they reach customers, and promoting transparency in software development. Learn how this approach can reduce cyber risks, protect businesses, and create safer digital ecosystems. Watch now!
CISA’s Federal Enterprise Operations Cyber Alignment Plan

Ensuring a unified cybersecurity strategy across federal agencies is crucial. This report outlines CISA’s plan to enhance cyber resilience, streamline operations, and strengthen defenses against evolving threats. Learn how this initiative aligns federal cybersecurity efforts to protect critical infrastructure. Download now for key insights.
Protecting The Mobile Ecosystem – Part 1

How can we truly protect the mobile ecosystem in an era of evolving threats? In this expert-led discussion, Quokka.io founder and Head of Sale, Simon, and Ilya Dreytser from Quokka delves into the complexities of mobile security—covering device vulnerabilities, app security, and user data protection. Learn how governments, businesses, and individuals can safeguard their data while navigating supply chain risks, BYOD policies, and regulatory challenges. Stay ahead of emerging mobile threats—watch now!
OIG Management Alert – ICE Management and Oversight of Mobile Apps

Federal agencies face ongoing cybersecurity risks. This DHS OIG report highlights critical vulnerabilities and provides recommendations for strengthening federal cybersecurity. Download now to stay informed on government security challenges.
CISA Secure by Design: Strengthening Software Security

Security should be built into software from the start. This CISA report outlines key principles of secure software design, helping organizations develop more resilient applications. Download now for best practices.
NIST SP 1800-22: Mobile Device Security

Mobile devices are critical to modern business, but they also introduce security risks. The National Institute of Standards and Technology (NIST) SP 1800-22 Cybersecurity Practice Guide offers practical solutions for securing mobile devices in enterprise settings. Download now for industry-backed best practices.
Revisiting the Security of Prepaid Android Carrier Devices

Are prepaid Android phones secure? This research revisits vulnerabilities in carrier-branded prepaid devices, analyzing risks to user privacy and security. Download now to explore the latest findings.
Libra: Library Identification in Obfuscated Android Apps

Obfuscation can’t hide everything. LibRa uncovers hidden third-party libraries in Android apps, even when obfuscation techniques are used. Learn how this approach helps improve security analysis and malware detection. Download now to explore cutting-edge library identification techniques.
Is Banning TikTok the Right Approach or Are We Ignoring the Real Problem?

Is banning TikTok the right move, or are we missing the bigger picture? This insightful discussion unpacks the security risks posed by TikTok and other mobile apps, exploring hidden threats, data collection practices, and the broader issue of app security. Experts reveal why focusing on a single app might not be enough and what steps users and policymakers should take to address the real problem. Stay informed—watch now!