Categories
Risk Management

Managing Risk is More Important Now Than Ever

Reading Time: < 1 minute

I just read the Forrester Wave™: Governance, Risk, And Compliance Platforms, Q1 2018.

Forrester reminds us all that “Risk and compliance management is more important than ever, thanks to the increasingly intangible nature of business value and the growing risk of violating customer trust.”

Categories
Dotfuscator CE

Emerging App Security Regulations: Are You Compliant?

Reading Time: 4 minutes

IT security is a hot topic, and no wonder — major healthcare, finance and government breaches have all made headlines in recent months prompting both federal agencies and compliance organizations to draft new security standards. As noted by Tech Target, regulations under Sarbanes-Oxley, PCI-DSS and HIPAA all lay out clear expectations for companies when it comes to protecting network assets, personal data and critical infrastructure.

Categories
Dotfuscator

Source Code, Please? Don’t Hand Hackers Your Vulnerabilities on a Silver Platter

Reading Time: 4 minutes

Applications are under siege. As demonstrated by the recent Equifax breach and many others, hackers leveraged everything from compromised mobile apps to cloud-based vulnerabilities. The result? Enterprise IT teams are recognizing that they’re being targeted – particularly their critical apps.

Categories
Dotfuscator

Keeping Secrets: The Evolving Expectation of App Defense

Reading Time: 4 minutes

Applications drive corporate success. As noted by Business 2 Community, the average American smartphone owner uses more than 10 apps per day and spends over three hours per day connected to the Internet via their mobile device.

Categories
Dotfuscator

PreEmptive Thoughts from Build 2017

Reading Time: 2 minutes

Like so many of us returning from Build 2017, we at PreEmptive are feeling both energized and highly motivated. Energized because of the truly impressive innovation coming out of both Microsoft and our larger ecosystem – and motivated because we can all see the expanding concern around application risk management and data security in this rapidly evolving world – and of course, that is where PreEmptive Solutions comes in.

Categories
Dotfuscator

IoT Security

Reading Time: < 1 minute

As I read the article:

Car Makers Haven’t Learned: Insecure Apps Expose Millions Of Connected Cars To Theft, Risks. I was reminded (again) that an issue for IoT devices is that their manufacturers have been slow to implement security for the software that runs on them. The focus has been on getting them out as quickly and as inexpensively as possible.

Categories
Dotfuscator

Protecting Data Accessed by Applications

Reading Time: 2 minutes

Sensitive business data is more vulnerable now than ever before. As a result, organizations are being pushed to protect/encrypt their data from its initial creation to its final destruction.

Categories
Mobile Protection

Your apps may be getting hacked – Why should you care? What can you do?

Reading Time: 3 minutes

Today more than ever, applications are mobile and can be run worldwide. And many useful apps access sensitive data and have value-added functionality within them (such as trade secrets). Because traditional firewall type attacks are much more difficult today, hackers are increasingly targeting both consumer and enterprise mobile and desktop apps as a newer attack vector.

Categories
Dotfuscator

PreEmptive is doing its part to help the Vancouver Winter Olympics go off smoothly.

Reading Time: < 1 minute

Online viewers of the Vancouver Olympics on NBCOlympics.com are using Silverlight based video and photo viewers delivering full HD quality content for viewers and helping content owners monetize their content. I am pleased to say that Dotfuscator had a hand in all of this innovation providing both protection and optimization for the high performing video player at the heart the NBC online Olympic experience.

Categories
Dotfuscator

Application Intrusion Detection

Reading Time: 4 minutes

I recently worked with a UNIX security expert setting up a small pile of servers. We hired him to handle the total system security of the servers as those servers would be charged with storing highly sensitive customer data. In fact, the vendor for this data had very strict requirements as to how we were allowed to store this data. The requirements (something similar to PCI Level I) were dictated in a 40 page document where one of the rules literally required a monitored camera to be shining directly on the primary database server at all times.