Mobile App Security

June 19, 2019

We all use mobile apps everyday, and the sheer number of apps available in app stores continues to grow. This makes them a highly attractive target to mobile app hackers looking to exploit users sensitive personal information. So how secure is your mobile app? Users are constantly sharing this personal information with apps when they log-in, make transactions, and share their location data. Hackers certainly don’t have a shortage of mobile devices to target either, with 1 out of every 36 being compromised by a mobile security threat. Compromised devices can give these hackers access to the microphones, cameras, and GPS data.

Spotlight

ENUSEC

ENUSEC's mission within and outside Edinburgh Napier University is to provide an environment for students and associate members around topics such as, but not limited to: penetration testing, digital forensics, malware analysis, and physical security. The society strongly supports the sharing of knowledge and project collaborations that could help its members in learning more about the security field, participating in competitions and outside events, as well as promoting the University's involvement in the field.

Other Infographics
news image

CYBERSECURITY & DATA PRIVACY

Infographic | January 21, 2020

In 2018, cybersecurity and regulation figure prominently among top trends and priorities, increasing in frequency for the 1,400+ executives we interviewed across 10 industries. CGI can provide a discussion of all available benchmarking from our interview data, including each client’s positioning on topics such as IT satisfaction, IT budgets, innovation investments, digital maturity and more.

Read More
news image

IT Audit-IT Security Infographic

Infographic | December 5, 2019

Cyber security has become a prevalent issue facing most organizations—one that companies recognize as an enterprise-wide issue requiring thoughtful attention. Investments in controls are necessary to protect organizations from increasingly sophisticated and widely available attack methods. Intentional attacks, breaches and incidents can have damaging consequences.

Read More
news image

Necessity of Cloud Database Security Best Practices

Infographic | February 15, 2022

Cloud Database Security is essential as it is subject to numerous cybersecurity threats. A well-designed cloud database security best practice can effectively reduce the risk of cloud database breaches.

Read More
news image

Privileged Access Management (PAM)

Infographic | April 4, 2022

Privileged access management (PAM) controls, monitors, secures and audits all human and non-human identities and activities across an enterprise IT environment.3% of organizations lack a mature approach to access management, resulting in two times more breaches.

Read More
news image

The Booming Information Security Industry

Infographic | August 26, 2021

The information security industry is expected to exhibit tremendous growth in 2021. The key drivers of this growth are increased spending on cybersecurity services and the rising demand for cloud security. According to Gartner, the 2021 information security and risk management spending is anticipated to grow almost 2X from the previous year.

Read More
news image

Effects of Virtualization Security Risks in Businesses

Infographic | February 19, 2022

Virtualization as a concept is experiencing more utility in recent times due to its ability to offer improved efficiency and scalability while reducing costs. Over 90% of businesses use server virtualization, and more organizations have begun exploring other types of virtualization, including desktop, application, and storage virtualization.

Read More

Spotlight

ENUSEC

ENUSEC's mission within and outside Edinburgh Napier University is to provide an environment for students and associate members around topics such as, but not limited to: penetration testing, digital forensics, malware analysis, and physical security. The society strongly supports the sharing of knowledge and project collaborations that could help its members in learning more about the security field, participating in competitions and outside events, as well as promoting the University's involvement in the field.

Events