Blog

CISOs and CIOs: Protecting Traditional Endpoints Isn’t Enough

CISOs and CIOs: Protecting Traditional Endpoints Isn’t Enough

As government cyber teams feverishly perform damage control from the SolarWinds hack, one major question for CISOs and CIOs cannot be ignored: “Protecting traditional endpoints isn’t enough; how am I

Read More
Elaborate Scam App Impersonates Leading Asian Bank; Victims Duped into ‘Investing’

Elaborate Scam App Impersonates Leading Asian Bank; Victims Duped into ‘Investing’

Cyber Armor, in collaboration with a leading Asian bank, have uncovered the early stages of a coordinated effort by scammers to defraud existing and new bank customers. In this blog, we will

Read More
Michigan Secure App – Powered by Cyber Armor – Protects Citizens from Mobile Attacks Chul Yim

Michigan Secure App – Powered by Cyber Armor – Protects Citizens from Mobile Attacks Chul Yim

According to a recent Michigan Department of Technology, Management and Budget (DTMB) news release, “the state of Michigan is now providing residents access to a free mobile application that can detect threats

Read More
Let’s Protect More than 40% of our Endpoints

Let’s Protect More than 40% of our Endpoints

Imagine finding out your most recent departmental budget was only 40% of what it should be. If you’re like me, you’d get a strong feeling that “something is missing and it’s a real disaster.

Read More
Unsecured Cloud Configurations Exposing Information in Thousands of Mobile Apps

Unsecured Cloud Configurations Exposing Information in Thousands of Mobile Apps

When approaching the development of a mobile application, one of the key design decisions revolves around the server side aspect of the application. Specifically, storage of information relevant to the app’s

Read More
Get In Touch