March 12, 2024, 5:59 a.m. | Jason Bloomberg

Security Boulevard securityboulevard.com





This is the third article in a guest blog series from Intellyx. Catch up on the first article here and the second one here.


Maintaining a corporate cybersecurity posture means locking down its threat surface – all points of potential compromise that ‘black hat’ hackers might use to penetrate the corporate network. Of all these points of compromise, among hackers’ favorites are smartphones and other handheld devices. Every device is an open door for hackers, as they are replete …

api security api security - analysis article black hat blog catch compromise corporate cybersecurity cybersecurity posture device down guest blog hackers intellyx love mobile app authentication mobile security news and insights phones points posture series third threat threat surface

More from securityboulevard.com / Security Boulevard

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

COMM Penetration Tester (PenTest-2), Chantilly, VA OS&CI Job #368

@ Allen Integrated Solutions | Chantilly, Virginia, United States

Consultant Sécurité SI H/F Gouvernance - Risques - Conformité

@ Hifield | Sèvres, France

Infrastructure Consultant

@ Telefonica Tech | Belfast, United Kingdom