Insights by Service: Cyber Security

‹ All Services

Cyber Security

January 25, 2018
Jan 25, 2018

Mobile World Congress 2018 Predictions

The biggest mobile show on earth, Mobile World Congress, is about to take place in the Mobile World Capital of Barcelona for the 13th year in a row. At this year’s event, the prominent theme is...
July 28, 2017
Jul 28, 2017

Blockchain for Healthcare – Hype or Reality?

Over the course of the past couple of months, the topic of blockchain has surfaced multiple times in my conversations with several Healthcare CxOs. Frankly, I was surprised for two main reasons....
June 7, 2017
Jun 7, 2017

Healthcare Embraces Cloud – Finally!

I vividly remember three years ago when I was talking with a CIO of a major healthcare provider around his organization’s strategy towards cloud migration. I was surprised to learn that cloud...
January 30, 2017
Jan 30, 2017

The MWC17 Planning Guide

What & When The biggest mobile show on earth, Mobile World Congress, is about to take place in the Mobile World Capital of Barcelona for the 12th year in a row. The 2016 edition hosted 2,200...
December 16, 2016
Dec 16, 2016

See Your Sales Success

The year is wrapping up and that traditionally means sales teams are looking back to measure what they accomplished and plan for the New Year. What if you could visualize your data to reward success...
November 6, 2015
Nov 6, 2015

What Is Test Data Privacy?

There’s a lot of meaning in the three-word term ‘Test Data Privacy.’ At a high level, it is data protection management or data masking while working on high security IT upgrades in the test...
July 17, 2015
Jul 17, 2015

5 Encryption Methods for Mobile

Last week, we attended a conference on General Data Protection Regulation and cryptographic solutions. Although this conference was not targeted at mobile apps specifically but at encryption of all...
June 30, 2015
Jun 30, 2015

Mobile Application Security by Design

Did you know that mobile security breaches have affected more than two-thirds of global organizations in the last 12 months? Our latest SlideShare presentation will help you assess where you stand,...
June 4, 2015
Jun 4, 2015

Mobile Take-Outs from Mary Meeker 2015 Report

Mary Meeker’s Internet Trend report for 2015 is out. If you don’t want to read the full 197 pages then here are the key take-outs relevant to mobility. 1. Mobile Usage Continues to Grow at a...
May 27, 2015
May 27, 2015

Mobility Trends in Government

The government is about efficiency. Okay, you can stop laughing now and get serious. It actually is. When you spend taxpayers’ money, everything you do is scrutinized. So much so that you spend...
May 15, 2015
May 15, 2015

5 Ways to Invest in Privacy in 2015

Public perception of Privacy and Security in the post-Snowden era has changed, leading to end users caring vastly more about the topic. Last year there were more breaches than ever before, ad...
April 24, 2015
Apr 24, 2015

Can Someone Hack Your Banking App?

The banking industry is seeing a second wave of digital transformation with 20% or more of all transactions now occurring from mobile devices, a number that is rapidly increasing. The majority of all...
February 23, 2015
Feb 23, 2015

What’s the best mobile cloud platform?

With the explosive growth of mobile applications and services in the enterprise, CIOs and IT Directors are scratching their heads. Once again they are on path to create 100s of new applications...
September 11, 2014
Sep 11, 2014

Digital East 2014: 3 Biggest Takeaways & Trends

Over the past two days, DMI sponsored Digital East 2014, a digital marketing conference in Tysons Corner, VA. We were honored to be among the talented group of presenters at the event, participating...
August 27, 2014
Aug 27, 2014

Bringing a Framework to Mobile Security

I’m often asked, “What is the best tool to secure my mobile devices?”  My answer is always: “Secure from what?”  Unfortunately in the security industry, people equate security with tools,...
August 12, 2014
Aug 12, 2014

Mobile Application Security

On Thursday August 14th I’m speaking on a webinar for the Multi-State ISAC about Mobile application security.  The webcast is at 2pm EDT, link to register here if you are interested.  This is the...
July 31, 2014
Jul 31, 2014

Is Your Cat Selling You Out?

There has been a lot of press about a new website dedicated to that which fuels the Internet: Cat pictures.  A new site call “I know where your cat lives” leverages what they claim is over 15...
July 18, 2014
Jul 18, 2014

Internet of Things Privacy Conference

Last week, I participated on a panel for the TRUSTe Internet of Things (IoT) Privacy Summit at a beautiful resort in Menlo Park, California.  The event brought together people from many different...
July 8, 2014
Jul 8, 2014

Big Data Revolution and Data Monetization

What once was a hyped term and a far out concept has now become a widely adopted practice in organizations big and small. The Big Data revolution began as companies started making investments towards...
June 27, 2014
Jun 27, 2014

The Internet of Things to get Hacked

There has been a lot of talk last couple of years about the Internet of Things (IoT).  IoT is basically the concept that household and personal appliances, including vehicles, will all be connected...
June 18, 2014
Jun 18, 2014

Ransomware

Every cyber security speaker has a presentation on “Threat Landscape” or “Cyber Crime” that is his or her go-to when talking to non-technical audiences who need to understand the world of...
June 12, 2014
Jun 12, 2014

Moving out of Castles

For millennia people relied on fortresses to protect themselves and their valuables, allowing only trusted people in. This all-in-one protection method used “defense in depth” with walls, moats,...
May 15, 2014
May 15, 2014

And the winner is…

Don’t put your popcorn, cocktails and confetti away just yet. Even though the awards season is behind us and the Grammy’s, Oscars and Golden Globes won’t be back until next year, the awards...
May 8, 2014
May 8, 2014

Security breaches: Who’s to Blame?

Last week, I participated in a webinar about SC Magazine’s Breach Survey. The survey was sent to a group of Chief Information Security Officer’s and included security-related questions, such...
April 22, 2014
Apr 22, 2014

Mobile Security Alert

Mobile devices are more vulnerable than ever to cyber-attacks. For an update on the mobile security landscape and solid advice on how to protect yourself, this is a read you shouldn't...
April 18, 2014
Apr 18, 2014

DMI Inn the Community

DMI recently received an award for our commitment to volunteering at the Children’s Inn at the National Institutes of Health (NIH). The Children’s Inn provides a supportive environment for...
April 9, 2014
Apr 9, 2014

Big Data: Payment Processors Hold the Key

The payment processing landscape has changed and the old ways of doing business are rapidly becoming obsolete. For merchants accepting most forms of payment is a necessity, but card processing...
March 28, 2014
Mar 28, 2014

DMI welcomes a new member to its family

A few weeks ago, I spoke with Fortune magazine reporter, Andrew Nusca, about our acquisition of KnowledgePath, a leading mobile Omnichannel commerce solutions company. One of his big questions was...
March 27, 2014
Mar 27, 2014

Do you Really need a Blackphone?

Edward Snowden spoke at SXSW conference.  He obviously didn’t fly to Texas, but instead spoke over Google Hangout from somewhere in Russia.  Many people’s perception of Snowden has evolved over...
March 5, 2014
Mar 5, 2014

It’s About Real-Time!

Imagine pulling into a shopping mall parking lot and getting a special offer that entices you to visit a particular store. Or that you are browsing in a department inside a store you’ve visited...
February 21, 2014
Feb 21, 2014

RSA Mobile Security Panel | Rick Doten

On Monday, February 24, I’ll be speaking on a panel at the RSA Security Conference in San Francisco on a panel about Mobile Security.  This talk is part of the Trusted Computing Group (TCG)...