{"id":1585449,"date":"2017-08-23T13:55:41","date_gmt":"2017-08-23T19:55:41","guid":{"rendered":"http:\/\/secblvd.wpengine.com\/?page_id=1585449"},"modified":"2018-01-11T02:10:03","modified_gmt":"2018-01-11T07:10:03","slug":"mobile-security","status":"publish","type":"page","link":"https:\/\/securityboulevard.com\/mobile-security\/","title":{"rendered":"Mobile Security"},"content":{"rendered":"<div id=\"pl-1585449\"  class=\"panel-layout\" ><div id=\"pg-1585449-0\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-1585449-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-1585449-0-0-0\" class=\"so-panel widget_text panel-first-child\" data-index=\"0\" ><div class=\"panel-widget-style panel-widget-style-for-1585449-0-0-0\" >\t\t\t<div class=\"textwidget\"><h1>Mobile Security<\/h1>\n<\/div>\n\t\t<\/div><\/div><div id=\"panel-1585449-0-0-1\" class=\"widget_text so-panel widget_custom_html\" data-index=\"1\" ><div class=\"textwidget custom-html-widget\"><div class=\"pt-cv-wrapper\"><div class=\"pt-cv-view pt-cv-scrollable pt-cv-colsys pt-cv-reused\" id=\"pt-cv-view-2f53dd3mdc\"><div data-id=\"pt-cv-page-1\" class=\"pt-cv-page\" data-cvc=\"1\"><div id=\"6954af32n5\" class=\"pt-cv-carousel pt-cv-slide\" data-ride=\"cvcarousel\" data-interval=10000>\n<div class=\"carousel-inner\"><div class=\"item active\"><div class=\"row\"><div class=\"col-md-12 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037038\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/black-friday-scammers-are-hard-at-work-security-experts\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvplbd\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"770\" height=\"300\" src=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/05\/credit-card-rupixen-Q59HmzK38eQ-unsplash-770x300.jpg\" class=\"pt-cv-thumbnail img-none\" alt=\"PCI DSS, third-party, businessmman with a credit card and computer\" \/><\/a>\n<div class=\"pt-cv-carousel-caption pt-cv-cap-w-img\"><h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/black-friday-scammers-are-hard-at-work-security-experts\/\" class=\"_self cvplbd\" target=\"_self\" >Black Friday Scammers are Hard at Work: Security Experts<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/jeffrey-burt\/\" rel=\"author\">Jeffrey Burt<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-20T09:00:12-05:00\">2 weeks ago<\/time><\/span><\/div><\/div><\/div><\/div><\/div>\n<div class=\"item\"><div class=\"row\"><div class=\"col-md-12 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col\"  data-pid=\"2036973\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/epa-ig-office-high-risk-security-flaws-in-hundreds-of-water-systems\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvplbd\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"770\" height=\"300\" src=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2021\/02\/oldsmar-greis-v-pixabay-770x300.jpg\" class=\"pt-cv-thumbnail img-none\" alt=\"water system cyberthreats EPA OIG\" srcset=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2021\/02\/oldsmar-greis-v-pixabay-770x300.jpg 770w, https:\/\/securityboulevard.com\/wp-content\/uploads\/2021\/02\/oldsmar-greis-v-pixabay-300x117.jpg 300w, https:\/\/securityboulevard.com\/wp-content\/uploads\/2021\/02\/oldsmar-greis-v-pixabay-1024x399.jpg 1024w, https:\/\/securityboulevard.com\/wp-content\/uploads\/2021\/02\/oldsmar-greis-v-pixabay-768x299.jpg 768w, https:\/\/securityboulevard.com\/wp-content\/uploads\/2021\/02\/oldsmar-greis-v-pixabay-1536x598.jpg 1536w, https:\/\/securityboulevard.com\/wp-content\/uploads\/2021\/02\/oldsmar-greis-v-pixabay.jpg 1540w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/><\/a>\n<div class=\"pt-cv-carousel-caption pt-cv-cap-w-img\"><h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/epa-ig-office-high-risk-security-flaws-in-hundreds-of-water-systems\/\" class=\"_self cvplbd\" target=\"_self\" >EPA IG Office: \u2018High-Risk\u2019 Security Flaws in Hundreds of Water Systems<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/jeffrey-burt\/\" rel=\"author\">Jeffrey Burt<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-19T16:15:39-05:00\">2 weeks ago<\/time><\/span><\/div><\/div><\/div><\/div><\/div>\n<div class=\"item\"><div class=\"row\"><div class=\"col-md-12 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col\"  data-pid=\"2036919\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/cisa-director-easterly-to-leave-when-trump-assumes-presidency\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvplbd\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"770\" height=\"300\" src=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/03\/jen-easterly-cisa-pd.png\" class=\"pt-cv-thumbnail img-none\" alt=\"Director of the Cybersecurity and Infrastructure Security Agency, Jen Easterly\" srcset=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/03\/jen-easterly-cisa-pd.png 770w, https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/03\/jen-easterly-cisa-pd-300x117.png 300w, https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/03\/jen-easterly-cisa-pd-768x299.png 768w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/><\/a>\n<div class=\"pt-cv-carousel-caption pt-cv-cap-w-img\"><h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/cisa-director-easterly-to-leave-when-trump-assumes-presidency\/\" class=\"_self cvplbd\" target=\"_self\" >CISA Director Easterly to Leave When Trump Assumes Presidency<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/jeffrey-burt\/\" rel=\"author\">Jeffrey Burt<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-19T10:08:53-05:00\">2 weeks ago<\/time><\/span><\/div><\/div><\/div><\/div><\/div><\/div>\n<a class=\"left carousel-control\" data-target=\"#6954af32n5\" data-cvslide=\"prev\">\r\n\t\t\t\t\t\t<span class=\"glyphicon glyphicon-chevron-left\"><\/span>\r\n\t\t\t\t\t<\/a>\r\n\t\t\t\t\t<a class=\"right carousel-control\" data-target=\"#6954af32n5\" data-cvslide=\"next\">\r\n\t\t\t\t\t\t<span class=\"glyphicon glyphicon-chevron-right\"><\/span>\r\n\t\t\t\t\t<\/a><\/div><\/div><\/div><\/div>\t\t\t<style type=\"text\/css\" id=\"pt-cv-inline-style-1ca4d14094\">#pt-cv-view-2f53dd3mdc .pt-cv-title a, #pt-cv-view-2f53dd3mdc  .panel-title { font-size: 40px !important; font-weight: 600 !important; line-height: 1.0 !important; }\n@media (min-width: 768px) and (max-width: 991px) {#pt-cv-view-2f53dd3mdc .pt-cv-title a, #pt-cv-view-2f53dd3mdc  .panel-title { font-size: 20px !important }}\n@media (max-width: 767px) {#pt-cv-view-2f53dd3mdc .pt-cv-title a, #pt-cv-view-2f53dd3mdc  .panel-title { font-size: 14px !important }}\n#pt-cv-view-2f53dd3mdc .pt-cv-carousel-caption  { background-color: rgba(51,51,51,.6) !important; }\n#pt-cv-view-2f53dd3mdc .pt-cv-meta-fields * { color: #ffffff !important; }\n#pt-cv-view-2f53dd3mdc .pt-cv-readmore  { color: #ffffff !important; background-color: #00aeef !important; }\n#pt-cv-view-2f53dd3mdc .pt-cv-readmore:hover  { color: #ffffff !important; background-color: #00aeef !important; }<\/style>\r\n\t\t\t<\/div><\/div><div id=\"panel-1585449-0-0-2\" class=\"widget_text so-panel widget_custom_html panel-last-child\" data-index=\"2\" ><div class=\"textwidget custom-html-widget\"><div class=\"pt-cv-wrapper\"><div class=\"pt-cv-view pt-cv-pinterest pt-cv-colsys pt-cv-shadow pt-cv-no-bb pt-cv-pgloadmore pt-cv-reused\" id=\"pt-cv-view-63f1e1bp89\"><div data-id=\"pt-cv-page-1\" class=\"pt-cv-page\" data-cvc=\"1\"><div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037038\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/black-friday-scammers-are-hard-at-work-security-experts\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"PCI DSS, third-party, businessmman with a credit card and computer\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/05\/credit-card-rupixen-Q59HmzK38eQ-unsplash-290x130.jpg\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/black-friday-scammers-are-hard-at-work-security-experts\/\" class=\"_self cvplbd\" target=\"_self\" >Black Friday Scammers are Hard at Work: Security Experts<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/jeffrey-burt\/\" rel=\"author\">Jeffrey Burt<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-20T09:00:12-05:00\">November 20, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/black-friday\/' title='black friday' class='pt-cv-tax-black-friday'>black friday<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/impersonation-attacks\/' title='Impersonation attacks' class='pt-cv-tax-impersonation-attacks'>Impersonation attacks<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/online-shopping-scams\/' title='online shopping scams' class='pt-cv-tax-online-shopping-scams'>online shopping scams<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/phishing\/' title='Phishing' class='pt-cv-tax-phishing'>Phishing<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">Scammers are using everything from fraudulent deals and fake ads to spoofed websites and brand impersonation to target online shoppers who are gearing up for Black Friday as the holiday buying season ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\">Security Boulevard<\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2036973\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/epa-ig-office-high-risk-security-flaws-in-hundreds-of-water-systems\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"water system cyberthreats EPA OIG\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2021\/02\/oldsmar-greis-v-pixabay-290x130.jpg\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/epa-ig-office-high-risk-security-flaws-in-hundreds-of-water-systems\/\" class=\"_self cvplbd\" target=\"_self\" >EPA IG Office: \u2018High-Risk\u2019 Security Flaws in Hundreds of Water Systems<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/jeffrey-burt\/\" rel=\"author\">Jeffrey Burt<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-19T16:15:39-05:00\">November 19, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/cyber-attack-on-critical-infrastructure\/' title='cyber attack on critical infrastructure' class='pt-cv-tax-cyber-attack-on-critical-infrastructure'>cyber attack on critical infrastructure<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/epa\/' title='EPA' class='pt-cv-tax-epa'>EPA<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/public-water-systems\/' title='public water systems' class='pt-cv-tax-public-water-systems'>public water systems<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/vulnerabilities\/' title='Vulnerabilities' class='pt-cv-tax-vulnerabilities'>Vulnerabilities<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">The watchdog for the EPA found that, of 1,062 U.S. drinking water systems it assessed, 97 had \"critical\" or \"high-risk\" security flaws and another 211 had less dangerous vulnerabilities, risking threats from ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\">Security Boulevard<\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2036919\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/cisa-director-easterly-to-leave-when-trump-assumes-presidency\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"Director of the Cybersecurity and Infrastructure Security Agency, Jen Easterly\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/03\/jen-easterly-cisa-pd-290x130.png\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/cisa-director-easterly-to-leave-when-trump-assumes-presidency\/\" class=\"_self cvplbd\" target=\"_self\" >CISA Director Easterly to Leave When Trump Assumes Presidency<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/jeffrey-burt\/\" rel=\"author\">Jeffrey Burt<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-19T10:08:53-05:00\">November 19, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/cisa\/' title='cisa' class='pt-cv-tax-cisa'>cisa<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/cybersecurity\/' title='Cybersecurity' class='pt-cv-tax-cybersecurity'>Cybersecurity<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/donald-trump\/' title='Donald Trump' class='pt-cv-tax-donald-trump'>Donald Trump<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/jen-easterly\/' title='Jen Easterly' class='pt-cv-tax-jen-easterly'>Jen Easterly<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/secure-by-design\/' title='secure by design' class='pt-cv-tax-secure-by-design'>secure by design<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">Jen Easterly, who took over as CISA director in 2021, will step down in January when Donald Trump takes over as president, creating an uncertain future for the critical cybersecurity agency and ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\">Security Boulevard<\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2036217\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/palo-alto-networks-issues-ai-red-alert\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"Palo Alto Networks SSH Management for Stronger Security\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2018\/05\/SSH-Management-290x130.jpg\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/palo-alto-networks-issues-ai-red-alert\/\" class=\"_self cvplbd\" target=\"_self\" >Palo Alto Networks Issues AI Red Alert<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/jon-swartz\/\" rel=\"author\">Jon Swartz<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-14T21:37:51-05:00\">November 14, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/ai\/' title='AI' class='pt-cv-tax-ai'>AI<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/ai-cybersecurity\/' title='AI Cybersecurity' class='pt-cv-tax-ai-cybersecurity'>AI Cybersecurity<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/palo-alto-networks\/' title='Palo Alto Networks' class='pt-cv-tax-palo-alto-networks'>Palo Alto Networks<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/platformization\/' title='platformization' class='pt-cv-tax-platformization'>platformization<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/pwc\/' title='PwC' class='pt-cv-tax-pwc'>PwC<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">SANTA CLARA, Calif. &#8212; With great promise comes potential peril. And while artificial intelligence (AI) is looked upon as a panacea for enterprises, it also poses an existential security threat. &#8220;We stand ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\">Security Boulevard<\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2035700\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/google-cloud-mfa-will-be-mandatory-for-all-users-in-2025\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"customer, experience, AWS Mithra internal security AI cloud security\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2023\/01\/03012022-290x130.jpg\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/google-cloud-mfa-will-be-mandatory-for-all-users-in-2025\/\" class=\"_self cvplbd\" target=\"_self\" >Google Cloud: MFA Will Be Mandatory for All Users in 2025<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/jeffrey-burt\/\" rel=\"author\">Jeffrey Burt<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-06T15:44:03-05:00\">November 6, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/2fa-mfa\/' title='2FA\/MFA' class='pt-cv-tax-2fa-mfa'>2FA\/MFA<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/google-cloud\/' title='google cloud' class='pt-cv-tax-google-cloud'>google cloud<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/microsoft-azure-cloud\/' title='Microsoft Azure Cloud' class='pt-cv-tax-microsoft-azure-cloud'>Microsoft Azure Cloud<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">Google Cloud says it is taking a phased approach to making MFA mandatory for all users by the end of 2025 to help bolster the cyber-protections against increasingly sophisticated cyberattacks ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\">Security Boulevard<\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2035429\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/canadian-man-accused-of-snowflake-data-breach-arrested\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"Snowflake data breach hacker arrested\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2022\/01\/hacker-g973a7b80b_1280-290x130.jpg\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/canadian-man-accused-of-snowflake-data-breach-arrested\/\" class=\"_self cvplbd\" target=\"_self\" >Man Accused of Snowflake Customer Data Breaches Arrested<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/jeffrey-burt\/\" rel=\"author\">Jeffrey Burt<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-05T17:19:04-05:00\">November 5, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/arrest\/' title='arrest' class='pt-cv-tax-arrest'>arrest<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/att\/' title='ATT' class='pt-cv-tax-att'>ATT<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/data-breach\/' title='Data breach' class='pt-cv-tax-data-breach'>Data breach<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/hacker\/' title='hacker' class='pt-cv-tax-hacker'>hacker<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/snowflake\/' title='snowflake' class='pt-cv-tax-snowflake'>snowflake<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">A Canadian resident, Alexander \u201cConnor\u201d Moucka, was arrested by Canadian law enforcement at the request of the United States for allegedly stealing sensitive data of myriad corporations like AT&T and Santander Bank ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\">Security Boulevard<\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2035249\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/google-uses-its-big-sleep-ai-agent-to-find-sqlite-security-flaw\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"Google Big Sleep AI LLM security vulnerability\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2020\/01\/linux-donald-clark-pixabay-e1629930323686-290x130.jpg\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/google-uses-its-big-sleep-ai-agent-to-find-sqlite-security-flaw\/\" class=\"_self cvplbd\" target=\"_self\" >Google Uses Its Big Sleep AI Agent to Find SQLite Security Flaw<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/jeffrey-burt\/\" rel=\"author\">Jeffrey Burt<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-05T11:33:49-05:00\">November 5, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/ai-cybersecurity\/' title='AI Cybersecurity' class='pt-cv-tax-ai-cybersecurity'>AI Cybersecurity<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/deepmind\/' title='DeepMind' class='pt-cv-tax-deepmind'>DeepMind<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/generative-ai\/' title='generative AI' class='pt-cv-tax-generative-ai'>generative AI<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/google\/' title='google' class='pt-cv-tax-google'>google<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/software-vulnerability\/' title='software vulnerability' class='pt-cv-tax-software-vulnerability'>software vulnerability<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">Google researchers behind the vendor's Big Sleep project used the LLM-based AI agent to detect a security flaw in SQLite, illustrating the value the emerging technology can have in discovering vulnerabilities that ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\">Security Boulevard<\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2035011\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/fido-consumers-are-adopting-passkeys-for-authentication\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"passkeys passwordless adoption\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/05\/laptop-john-schnobrich-2FPjlAyMQTA-unsplash-290x130.jpg\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/fido-consumers-are-adopting-passkeys-for-authentication\/\" class=\"_self cvplbd\" target=\"_self\" >FIDO: Consumers are Adopting Passkeys for Authentication<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/jeffrey-burt\/\" rel=\"author\">Jeffrey Burt<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-04T17:24:01-05:00\">November 4, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/biometrics-authentication\/' title='biometrics authentication' class='pt-cv-tax-biometrics-authentication'>biometrics authentication<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/fido-alliance\/' title='FIDO Alliance' class='pt-cv-tax-fido-alliance'>FIDO Alliance<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/passkeys\/' title='Passkeys' class='pt-cv-tax-passkeys'>Passkeys<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/passwordless-authentication\/' title='passwordless-authentication' class='pt-cv-tax-passwordless-authentication'>passwordless-authentication<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">The FIDO Alliance found in a survey that as consumers become more familiar with passkeys, they are adopting the technology as a more secure alternative to passwords to authenticate their identities online ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\">Security Boulevard<\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2034906\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/greynoise-ais-central-role-in-detecting-security-flaws-in-iot-devices\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"AI emerging technology secure by design cybersecurity\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/04\/AIOps-290x130.jpg\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/greynoise-ais-central-role-in-detecting-security-flaws-in-iot-devices\/\" class=\"_self cvplbd\" target=\"_self\" >GreyNoise: AI\u2019s Central Role in Detecting Security Flaws in IoT Devices<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/jeffrey-burt\/\" rel=\"author\">Jeffrey Burt<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-01T16:45:52-04:00\">November 1, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/ai\/' title='AI' class='pt-cv-tax-ai'>AI<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/ai-powered-threat-detection\/' title='AI-powered threat detection' class='pt-cv-tax-ai-powered-threat-detection'>AI-powered threat detection<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/cybersecurity\/' title='Cybersecurity' class='pt-cv-tax-cybersecurity'>Cybersecurity<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/internet-of-things-iot-security\/' title='Internet of Things (IoT) Security' class='pt-cv-tax-internet-of-things-iot-security'>Internet of Things (IoT) Security<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">GreyNoise Intelligence researchers said proprietary internal AI-based tools allowed them to detect and identify two vulnerabilities in IoT live-stream cameras that traditional cybersecurity technologies would not have been able to discover ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\">Security Boulevard<\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2034896\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/microsofts-controversial-recall-feature-release-delayed-again\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"Microsoft Teams Okta Zoom cybersecurity CEO MS teams\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2020\/10\/MS-Teams-290x130.jpg\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/microsofts-controversial-recall-feature-release-delayed-again\/\" class=\"_self cvplbd\" target=\"_self\" >Microsoft\u2019s Controversial Recall Feature Release Delayed Again<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/jeffrey-burt\/\" rel=\"author\">Jeffrey Burt<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-01T13:46:17-04:00\">November 1, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/data-security-and-privacy\/' title='Data security and privacy' class='pt-cv-tax-data-security-and-privacy'>Data security and privacy<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/microsoft-copilot\/' title='Microsoft Copilot' class='pt-cv-tax-microsoft-copilot'>Microsoft Copilot<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/microsoft-recall\/' title='Microsoft Recall' class='pt-cv-tax-microsoft-recall'>Microsoft Recall<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/windows-pcs\/' title='Windows PCs' class='pt-cv-tax-windows-pcs'>Windows PCs<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">Microsoft is again delaying the release of its controversial Recall feature for new Windows Copilot+ PCs until December to get new security capabilities in place and hopefully avoid the industry backlash it ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\">Security Boulevard<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"text-center pt-cv-pagination-wrapper\"><a href='https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/pages\/1585449\/?_page=2' onclick='event.preventDefault()' class=\"pt-cv-more btn btn-primary btn-sm\" data-totalpages=\"50\" data-nextpages=\"2\" data-sid=\"63f1e1bp89\" data-unid=\"5db589d0cb7428cc5b03c8d00fe53143\" data-isblock=\"\" data-postid=\"\">Load more <span class=\"caret\"><\/span><\/a><img loading=\"lazy\" decoding=\"async\" width=\"15\" height=\"15\" class=\"pt-cv-spinner\" alt=\"Loading...\" src=\"data:image\/gif;base64,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\" \/><div class=\"clear pt-cv-clear-pagination\"><\/div><\/div><\/div>\t\t\t<style type=\"text\/css\" id=\"pt-cv-inline-style-11d8523c7s\">#pt-cv-view-63f1e1bp89 .pt-cv-content-item { padding-left: 3px !important; }\n#pt-cv-view-63f1e1bp89  { margin-right: 3px !important; margin-left: 3px !important; }\n#pt-cv-view-63f1e1bp89 .pt-cv-pinmas { padding-left: 3px !important; }\n#pt-cv-view-63f1e1bp89 .pt-cv-title a, #pt-cv-view-63f1e1bp89  .panel-title { font-family: 'Source Sans Pro', Arial, serif !important; font-size: 20px !important; line-height: 1.3 !important; }\n#pt-cv-view-63f1e1bp89  .pt-cv-title a:hover, #pt-cv-view-63f1e1bp89  .panel-title:hover   { font-family: 'Source Sans Pro', Arial, serif !important; }\n#pt-cv-view-63f1e1bp89 .pt-cv-content , #pt-cv-view-63f1e1bp89  .pt-cv-content *:not(.pt-cv-readmore):not(style):not(script) { font-family: 'Source Sans Pro', Arial, serif !important; font-size: 16px !important; line-height: 1.3 !important; }\n#pt-cv-view-63f1e1bp89 .pt-cv-meta-fields .glyphicon {font-family: 'Glyphicons Halflings' !important; line-height: 1 !important;}\n#pt-cv-view-63f1e1bp89 .pt-cv-meta-fields * { font-family: 'Roboto', Arial, serif !important; font-size: 12px !important; line-height: 1.3 !important; }\n#pt-cv-view-63f1e1bp89 .pt-cv-custom-fields * { font-family: 'Roboto', Arial, serif !important; font-size: 12px !important; line-height: 1.3 !important; display: block !important; text-align: left !important; clear: both !important; }\n#pt-cv-view-63f1e1bp89 .pt-cv-readmore  { font-family: 'Roboto', Arial, serif !important; color: #ffffff !important; background-color: #6190bb !important; }\n#pt-cv-view-63f1e1bp89 .pt-cv-readmore:hover  { font-family: 'Roboto', Arial, serif !important; color: #ffffff !important; background-color: #00aeef !important; }\n#pt-cv-view-63f1e1bp89  + .pt-cv-pagination-wrapper .pt-cv-more-inactive , #pt-cv-view-63f1e1bp89  + .pt-cv-pagination-wrapper .pagination a, .pt-cv-pagination[data-sid='63f1e1bp89'] a { font-family: 'Source Sans Pro', Arial, serif !important; }\n#pt-cv-view-63f1e1bp89  + .pt-cv-pagination-wrapper .pt-cv-more , #pt-cv-view-63f1e1bp89  + .pt-cv-pagination-wrapper .pagination .active a, .pt-cv-pagination[data-sid='63f1e1bp89'] .active a { font-family: 'Source Sans Pro', Arial, serif !important; color: #ffffff !important; background-color: #6190bb !important; }<\/style>\r\n\t\t\t<link href='\/\/fonts.googleapis.com\/css?family=Source+Sans+Pro' rel='stylesheet' type='text\/css'><link href='\/\/fonts.googleapis.com\/css?family=Roboto' rel='stylesheet' type='text\/css'><\/div><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Mobile Security<\/p>\n","protected":false},"author":6042,"featured_media":1595095,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-1585449","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.9 (Yoast SEO v23.9) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Mobile Security - Security Boulevard<\/title>\n<meta name=\"description\" content=\"Mobile Security\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securityboulevard.com\/mobile-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mobile Security\" \/>\n<meta property=\"og:description\" content=\"Mobile Security\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securityboulevard.com\/mobile-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Boulevard\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/groups\/24445075146\/\" \/>\n<meta property=\"article:modified_time\" content=\"2018-01-11T07:10:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2017\/08\/canstockphoto18318562.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"3000\" \/>\n\t<meta property=\"og:image:height\" content=\"2000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@securityblvd\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securityboulevard.com\/mobile-security\/\",\"url\":\"https:\/\/securityboulevard.com\/mobile-security\/\",\"name\":\"Mobile Security - Security Boulevard\",\"isPartOf\":{\"@id\":\"https:\/\/securityboulevard.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securityboulevard.com\/mobile-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securityboulevard.com\/mobile-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2017\/08\/canstockphoto18318562.jpg\",\"datePublished\":\"2017-08-23T19:55:41+00:00\",\"dateModified\":\"2018-01-11T07:10:03+00:00\",\"description\":\"Mobile Security\",\"breadcrumb\":{\"@id\":\"https:\/\/securityboulevard.com\/mobile-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securityboulevard.com\/mobile-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/securityboulevard.com\/mobile-security\/#primaryimage\",\"url\":\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2017\/08\/canstockphoto18318562.jpg\",\"contentUrl\":\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2017\/08\/canstockphoto18318562.jpg\",\"width\":3000,\"height\":2000,\"caption\":\"DAM\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securityboulevard.com\/mobile-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securityboulevard.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mobile Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securityboulevard.com\/#website\",\"url\":\"https:\/\/securityboulevard.com\/\",\"name\":\"Security Boulevard\",\"description\":\"The Home of the Security Bloggers Network\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securityboulevard.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Mobile Security - Security Boulevard","description":"Mobile Security","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securityboulevard.com\/mobile-security\/","og_locale":"en_US","og_type":"article","og_title":"Mobile Security","og_description":"Mobile Security","og_url":"https:\/\/securityboulevard.com\/mobile-security\/","og_site_name":"Security Boulevard","article_publisher":"https:\/\/www.facebook.com\/groups\/24445075146\/","article_modified_time":"2018-01-11T07:10:03+00:00","og_image":[{"width":3000,"height":2000,"url":"https:\/\/securityboulevard.com\/wp-content\/uploads\/2017\/08\/canstockphoto18318562.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@securityblvd","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/securityboulevard.com\/mobile-security\/","url":"https:\/\/securityboulevard.com\/mobile-security\/","name":"Mobile Security - Security Boulevard","isPartOf":{"@id":"https:\/\/securityboulevard.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securityboulevard.com\/mobile-security\/#primaryimage"},"image":{"@id":"https:\/\/securityboulevard.com\/mobile-security\/#primaryimage"},"thumbnailUrl":"https:\/\/securityboulevard.com\/wp-content\/uploads\/2017\/08\/canstockphoto18318562.jpg","datePublished":"2017-08-23T19:55:41+00:00","dateModified":"2018-01-11T07:10:03+00:00","description":"Mobile Security","breadcrumb":{"@id":"https:\/\/securityboulevard.com\/mobile-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securityboulevard.com\/mobile-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/securityboulevard.com\/mobile-security\/#primaryimage","url":"https:\/\/securityboulevard.com\/wp-content\/uploads\/2017\/08\/canstockphoto18318562.jpg","contentUrl":"https:\/\/securityboulevard.com\/wp-content\/uploads\/2017\/08\/canstockphoto18318562.jpg","width":3000,"height":2000,"caption":"DAM"},{"@type":"BreadcrumbList","@id":"https:\/\/securityboulevard.com\/mobile-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securityboulevard.com\/"},{"@type":"ListItem","position":2,"name":"Mobile Security"}]},{"@type":"WebSite","@id":"https:\/\/securityboulevard.com\/#website","url":"https:\/\/securityboulevard.com\/","name":"Security Boulevard","description":"The Home of the Security Bloggers Network","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securityboulevard.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/P91vu9-6ErL","_links":{"self":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/pages\/1585449","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/users\/6042"}],"replies":[{"embeddable":true,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/comments?post=1585449"}],"version-history":[{"count":0,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/pages\/1585449\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/media\/1595095"}],"wp:attachment":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/media?parent=1585449"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}