VP of Marketing


VP of Marketing

Articles and Comments By George McGregor

Expert Commentary
Board And CISO Disconnect on Cybersecurity Preparedness 'Rings Alarm Bells'– Expert Comments
September 11 , 2023 by George McGregor
“It seems that the real issue here is the engagement of board members - only half the board membe...
Expert Commentary
Duolingo Data Breach: 2.6 Million Users At Risk Of Targeted Phishing Attacks
August 24 , 2023 by George McGregor
“This unfortunately makes Duolingo look extremely negligent for a number of reasons    “Le...
Expert Commentary
Cyber Threats Loom Over Major Sporting Events, Microsoft Study Reveals
August 07 , 2023 by George McGregor
“A key element are the apps which are launched for events (for example the FIFA Women's World Cup...
Expert Commentary
Holiday DDoS Cyberattacks Can Hurt E-Commerce
November 30 , 2022 by George McGregor
Hackers are increasingly using mobile apps as the vehicle to execute these types of DDoS attacks, ei...
Expert Commentary
Cyber Attacks Grew By 257% Year Over Year – Expert Comments
November 29 , 2022 by George McGregor
These statistics also show the need to give more attention to the mobile apps which are increasingly...
Expert Commentary
Cybersecurity Costs - 54% Would Re-consider Place Of Employment After Cyberattack – Approov Comments
October 26 , 2022 by George McGregor
The consequences of breaches and security incidents do indeed run deep and the impact on employee mo...
Expert Commentary
BOD 23-01 - Fed Civilian Agencies Must Report Network Vulns To CISA – Expert Comments
October 05 , 2022 by George McGregor
This initiative directly concerns network infrastructure and does mention mobile devices but only in...
Expert Commentary
Google Play Store Serving Up Chameleon-like Apps
August 22 , 2022 by George McGregor
Google has so far been ineffective in attempts to prevent fake and malicious apps from being availab...
Expert Commentary
Mobile App Data Found Exposing API’s & Data In 1,000’s Of Cloud Databases
March 18 , 2022 by George McGregor
This is yet another example of how easy it is to steal API credentials and use them in modified apps...
Expert Commentary
Cybersecurity Experts React To DHS Launches Cyber Safety Review Board
February 07 , 2022 by George McGregor
We welcome this initiative. It will be important for the board to consider two major reports publish...
Expert Commentary
F5 API Sprawl Rept. Finds Nine In 10 Enterprises Had An API Security Incident In 2020
November 05 , 2021 by George McGregor
The report does discuss the issue of \"secrets sprawl\", highlighting how secrets such as API keys a...
Expert Commentary
API Keys Exposed - Millions Of Transaction Details At Risk, Experts Weigh In
September 21 , 2021 by George McGregor
APIs are great ways of using specialized third-party services while focusing on core business strate...
Expert Commentary
Expert Comments - Travis CI Flaw Reveals *All* Keys, Credentials, And API Tokens, "Developers Furious"
September 17 , 2021 by George McGregor
It is well known that mobile apps themselves are a rich source of keys and secrets which can be used...
Expert Commentary
Experts Perspectives On Verizon Mobile Sec Index: WFH The New Normal
April 08 , 2021 by George McGregor
An important point is this is not only about people using their own laptops or PCs to do their work...
Expert Commentary
Clast82 Malware Dropper In 9 Utility Apps On Google Play Store
March 15 , 2021 by George McGregor
The malware’s ability to remain undetected demonstrates the importance of why a mobile security so...