Remove Mobile Remove Security Remove Social
article thumbnail

Are Your Firewalls and VPNs the Weakest Link in Your Security Stack?

Network World

Zero Trust architecture was created to solve the limitations of legacy security architectures. Recent critical vulnerabilities in VPNs and firewalls have exposed the risks associated with perimeter-based security measures. Security requires an adaptive model that understands the fluidity and dynamism of the modern digital landscape.

Firewall 396
article thumbnail

It's time to retire the Social Security number

Tech Republic Security

With 40 million people having their SSN exposed during the T-Mobile hack, it's time to reconsider the usefulness of the Social Security number.

Social 512
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Mobile Device Security Policy

Tech Republic Security

Mobile devices are commonly used to conduct company business, which can render them more susceptible to risk than desktop or even laptop computers. In addition, the same social engineering, phishing and application/operating system vulnerabilities which plague desktops.

Mobile 420
article thumbnail

T-Mobile breach exposed personal data of almost 50 million people

Tech Republic Security

Attackers captured the names, dates of birth, Social Security numbers and driver's license numbers of millions of current, former and potential T-Mobile customers.

Mobile 410
article thumbnail

Super-app: a mobile platform worthy of its name

CIO Business Intelligence

Super-apps are versatile mobile or web applications integrating multiple services and functionality into a unified platform experience. The demographic landscape continues to change, with younger generations favoring mobile solutions that offer immediacy and convenience. Managing security requirements is paramount.

Mobile 165
article thumbnail

When voice deepfakes come calling

CIO Business Intelligence

Intro: Time was, a call center agent could be relatively secure in knowing who was at the other end of the line. And if they werent, multi-factor authentication (MFA), answers to security questions, and verbal passwords would solve the issue. Often, bots are involved in this process.

article thumbnail

Intelligence at the edge opens up more risks: how unified SASE can solve it

Network World

In an increasingly mobile and modern workforce, smart technologies such as AI-driven edge solutions and the Internet of Things (IoT) can help enterprises improve productivity and efficiencywhether to address operational roadblocks or respond faster to market demands. Within that, 80% have plans to partner with a technology vendor.

Network 243