Articles

  • 1 week ago | entrepreneur.com | Apu Pavithran

    Una startup es solo tan fuerte como su seguridad. Por supuesto, aspectos como la innovación y el ajuste producto-mercado dominan la atención de los fundadores, pero muchas veces pasan por alto la importancia empresarial de contar con un ecosistema seguro. Su idea revolucionaria, equipo talentoso y visión estratégica se vuelven vulnerables cuando se descuidan las medidas básicas de seguridad. Y, en el panorama actual, esa vulnerabilidad comienza con el dispositivo que tiene en sus manos.

  • 1 week ago | mytotalretail.com | Apu Pavithran

    Retail has become a frontline battleground for digital transformation and Android sits at its core. Today, of frontline retail devices run on Android, powering everything from mobile point-of-sale (mPoS) systems and inventory apps to customer engagement platforms. This shift has unlocked efficiency and agility. However, it has also opened the door to unprecedented risk. Over the past five years, app usage on Android-powered retail devices has surged by .

  • 3 weeks ago | storage-insider.de | Apu Pavithran

    Newsletter Whitepaper Webinare Podcast Compliance unter komplexen Umständen Anbieter zum Thema Die NIS-2-Richtlinie markiert einen Wandel in der EU-Cybersicherheit, indem sie sich auf weitere Branchen ausdehnt und strengere Anforderungen stellt. Angesichts hoher Strafen und komplexer Compliance-Ansprüche stehen Unternehmen vor einem Schlüsselmoment. Sie müssen sich im Chaos zurechtfinden und in einer Welt der Cyber-Bedrohungen Resilienz aufbauen. Die Europäische Union hat mit der Umsetzung...

  • 1 month ago | eschoolnews.com | Apu Pavithran

    Twitter Facebook LinkedIn Email Print Key points: Explosive app growth has outpaced security oversights K-12 cyberattacks threaten data–and students How schools can fight growing ransomware attacks For more on cybersecurity, visit eSN’s IT Leadership hub In May 2024, Microsoft identified a critical vulnerability pattern targeting Android applications, ominously called “Dirty Stream.” This vulnerability allows malicious apps to overwrite files, potentially leading to arbitrary code execution,...

  • 1 month ago | builtin.com | Apu Pavithran

    Image: Shutterstock / Built In Hacks today come in all shapes and sizes. From social engineering to password cracking, bad actors are doing more with less post-pandemic thanks to new technologies and artificial intelligence (AI). To make matters worse, they’re scaling these operations and targeting enterprises with low- or no-cost tools. Conversely, the admins behind enterprise ecosystems are under-resourced and overworked in the face of novel threats. Case in point: screen hacking.

Contact details

Socials & Sites

Try JournoFinder For Free

Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.

Start Your 7-Day Free Trial →

X (formerly Twitter)

Followers
337
Tweets
1K
DMs Open
No
Apu Pavithran
Apu Pavithran @ApuPavithran
26 Sep 22

RT @thehexnode: Here’s the winning picture from the #HexCon22 #selfiecontest gallery 🤳! Congratulations David Walsh! The goodies are headed…

Apu Pavithran
Apu Pavithran @ApuPavithran
26 Sep 22

RT @thehexnode: And that’s a wrap to a fun-filled day at #HexCon22! Day 3 commenced with knowledge-rich and informative sessions including…

Apu Pavithran
Apu Pavithran @ApuPavithran
23 Sep 22

RT @thehexnode: HexCon22 wrapped up with great success. And, now is the time to announce the ones who capped the leaderboard 👑📈. Congratu…