Blog: Why Hackers Love Phones - Keep your Eye on the Device

Blog: Why Hackers Love Phones – Keep your Eye on the Device

This is the third article in a guest blog series from Intellyx. Catch up on the first article here and the second one here. Maintaining a corporate cybersecurity posture means locking down its threat surface – all points of potential compromise that ‘black hat’ hackers might use to penetrate the corporate ... Read More
Why Isn’t Mobile at the Center of Your Cybersecurity Strategy?

Why Isn’t Mobile at the Center of Your Cybersecurity Strategy?

This is the first article in a guest blog series by Jason Bloomberg, Managing Partner, Intellyx Focusing on user authentication, including multi-factor authentication, is not enough to put mobile at the center of your cybersecurity strategy. It is essential to ensure the integrity of devices, applications, and communication channels, along with ... Read More
OSZAR »