March 12, 2024, 5:59 a.m. | Jason Bloomberg

Security Boulevard securityboulevard.com





This is the third article in a guest blog series from Intellyx. Catch up on the first article here and the second one here.


Maintaining a corporate cybersecurity posture means locking down its threat surface – all points of potential compromise that ‘black hat’ hackers might use to penetrate the corporate network. Of all these points of compromise, among hackers’ favorites are smartphones and other handheld devices. Every device is an open door for hackers, as they are replete …

api security api security - analysis article black hat blog catch compromise corporate cybersecurity cybersecurity posture device down guest blog hackers intellyx love mobile app authentication mobile security news and insights phones points posture series third threat threat surface

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Threat Analysis Engineer

@ Gen | IND - Tamil Nadu, Chennai

Head of Security

@ Hippocratic AI | Palo Alto

IT Security Vulnerability Management Specialist (15.10)

@ OCT Consulting, LLC | Washington, District of Columbia, United States

Security Engineer - Netskope/Proofpoint

@ Sainsbury's | Coventry, West Midlands, United Kingdom

Journeyman Cybersecurity Analyst

@ ISYS Technologies | Kirtland AFB, NM, United States