The Coalfire Blog
Welcome to the Coalfire Blog, a resource covering the most important issues in IT security and compliance. You'll also find information on Coalfire's insights into the unique IT GRC issues that impact the industries we serve, including Retail, Financial Services, Healthcare, Higher Education, Software, Government and Utilities.
The Coalfire blog is written by the company's leadership team and our highly-credentialed security assessment experts. We look forward to your comments, so please join the conversation.
BYOD Survey Results: Employees are not playing it safe with company data
August 14, 2012, Mike Weber, Managing Director, Coalfire Labs
Employers are seeing a drastic increase in the number of employees using personal smartphones and tablets in the office. This “Bring Your Own Device” (BYOD) trend is causing headaches for the IT department and there is no stopping this trend. Due to the sensitive nature of company information often accessed on those devices, it has become a growing concern for small and large businesses alike. Read More
Posted in: byod, GRC, IT, mobile, security | 1 Comments
Mobile Banking Malware: Protect Your Finances
April 02, 2012, Mark Lucas, VP, Navis Services
The prolific rise in smartphones, tablets and other portable devices has greatly expanded the ways in which we interact with personal and professional services. The public can now singlehandedly use their mobile device to pay for things with the ease of flashing their cell phone. Unfortunately, this rapid expansion of convenience and service also expands the threats. Read More
Posted in: e-banking, mobile, PA-DSS | 0 Comments
Mobile Application Security – The New Frontier
April 18, 2011, Bruce DeYoung,
The power and popularity of consumer mobile computing is changing faster then you can say iFart (the #1 downloaded app worldwide). Commercial entities are rapidly adopting mobile-based applications for retail sales floors, restaurants and dining rooms, distributed mobile banking, and more. Read More
Posted in: byod, mobile, security | 0 Comments