Malware and DDoS Were the Most Common Attack Types in 2014: IBM | SecurityWeek.Com
Hojt Communication is a consulting company focused on our clients need to rapidly bring the right product to the right market. We stand out due to our ability to combine skills in strategy, implementation, operations and technology with deep understanding about the connected world and the new levels of security and privacy protection that world brings.
vision,strategy,product,market,business development,marketing,mobility,Internet of Things,IoT,Security
1404
post-template-default,single,single-post,postid-1404,single-format-standard,stockholm-core-2.4.6,select-child-theme-ver-1.0.0,select-theme-ver-9.13,ajax_fade,page_not_loaded,,qode_menu_,wpb-js-composer js-comp-ver-8.2,vc_responsive

Malware and DDoS Were the Most Common Attack Types in 2014: IBM | SecurityWeek.Com

IBM X-Force has released a new report detailing the security incidents and vulnerability disclosures seen in 2014.

Source: www.securityweek.com

It is time for the app developer community to grow up. It is not about doing the coolest stuff with nice graphics and UX. Not without protecting the user. The smartphone is not (only) a toy anymore.

Many app developers are front-end focused and designers coming from the web industry, but mobile is not the same as web. 

IT professionals have been security focused for a long time, but they are not working in app agencies.

These two professions have to merge and the architecture has to evolve into Mobile First focusing on security on public networks and mobile devices. 

There are many differences in capabilities and environments between traditional web and IT and the newly connected mobile world, especially when it comes to security. Communication protected by a session tunnel (like VPN or SSL/TLS) must be considered as a special case. Mobility is asynchronous in its nature with devices moving in and out of the network. Data must be protected in transit between multiple endpoints. Data and device location can be monitored remotely by carriers and others. Everything happens outside firewalls.

See on Scoop.itSecure communication

The post Malware and DDoS Were the Most Common Attack Types in 2014: IBM | SecurityWeek.Com appeared first on Apptimate.


Source: Apptimate
Malware and DDoS Were the Most Common Attack Types in 2014: IBM | SecurityWeek.Com