Security Archives - Root Level Technology

Archive: Security Archives - Root Level Technology

Add Security to Fintech Services, the Modern Way

Wouldn’t you know it. Just as demand for mobile fintech services explodes, the familiar and unwelcome sight of security weaknesses rears its ugly head.  The constant demand for robust, secure services would be discouraging, if all we had to work with were traditional development models and tools. The good news: developers now have a boatload of new infrastructure frameworks, models, practices and tools that make security an efficient and integral part of application development. Saying Goodbye to Old Security Habits The traditional way to secure applications is to engage the QA process at the end of production. That’s when time pressures to release the app are the greatest, and it’s usually too late to make significant changes. When changes are […]

Continue reading

Big Data: Deep Learning with Tensor Flow

Will Google’s TensorFlow Fuel Your Next Breakout Product? In the era of self-driving cars and the internet of things, it can be easy to get caught up in the “window effect”.  Maybe you’ve been there already…on the outside of that window looking in jealousy.  That feeling of “sure, deep learning and big data utilization are all perfectly well for Google and other tech giants, but it’s entirely out of my company’s league.”  If you’ve thought that far into the matter, you’ve probably also reflected on the massive upside potential that these technologies hold (probably with a healthy dose of entrepreneurial jealousy, if we had to guess).  But now you can stop wishing and start innovating.  In a move that holds […]

Continue reading

5 Reasons Multi-Cloud Deployment is the Right Solution

These days so much is done in the Cloud that it is hard to imagine what life was like before it. The Cloud makes business more flexible, dynamic, and ready to adapt to the ever-changing needs of the digital world. That said, many companies find themselves in an awkward position because they have shifted much of their infrastructure onto one provider. Obviously, there are some potential problems with this type of setup. Issues can range from the company experiencing technical issues, which could mean no access to company data or being in a situation where you have to change providers due to a buyout or a change in the terms of service. These are just a few of the many […]

Continue reading

Wannacry Ransomware

In this day and age where we’ve never been more attached to our gadgets and computers, imagine if your laptop was literally held ransom? That’s the reality thousands of individuals and corporations woke up to on the May 12th, 2017 when a global malware campaign, called WannaCry (also called WCry or Wannacryptor), began.   This malware is a ransomware variant, and some of its most notable victims are the United Kingdom’s National Health Service (NHS), Telefonica in Spain, Renault in France and some Chinese universities. This article aims to reveal key details about this rapidly growing malware threat and how to protect your computers from it.   How does WannaCry Operate? Most malware attacks are focused on security vulnerabilities on […]

Continue reading

Three Critical Steps To Protecting Your Business From Mobile Malware

  Mobile malware is on the rise. According to a recent Kaspersky survey, malicious software targeted at mobile devices increased by nearly 1.7 times between Q1 and Q2 2016. It’s an upward trend that shows no signs of slowing – and if you haven’t adjusted to it yet, it’s long past time that you do. Smartphones have, after all, become ubiquitous in enterprise. Everybody uses them, even if you think they don’t. If you get complacent and fail to secure them, you will eventually suffer a breach. It’s not a question of if – it’s a question of when. MDM, MAM, and MCM Standing for Mobile Device Management, Mobile Application Management, and Mobile Content Management respectively, these three abbreviations are […]

Continue reading