Skip to content

CEO Blogs

98% of Apps are Insecure — Here’s How You Can Protect Yours

98% of Apps are Insecure — Here’s How You Can Protect Yours

Sadly, one can make the argument that if software vendors did a better job of integrating security testing throughout the development lifecycle, our current struggles with application security might be less challenging.

In fact, however, software vendors are late to the party. Their security testing tends to be tacked on to the end of development lifecycles as an afterthought, which may account for one recent study ’s startling conclusions that:

98% of applications carry at least one application security risk (and each risk may signal the presence of multiple vulnerabilities)
80% of applications showed more than five risks
The average application registered 22.4 risks

Tim Burke

Apps, Apps Everywhere — But How Secure Are Yours

Apps, Apps Everywhere — But How Secure Are Yours

Did you know that your applications are the most vulnerable part of your IT operations?

These days, problems with apps — many of them web-based apps — account for the majority of information security breaches. Over the last year or so, and going forward, application-level attacks have emerged as the preferred vector for gaining access to sensitive (and valuable) data. What’s more, the threats are becoming increasingly acute as complex web apps, as well as mobile apps, play ever greater roles in our business and personal activities.

App vulnerabilities for sale — cheap at the price?

Tim Burke

What Secure, Enterprise-Grade File Sharing/Syncing Looks Like

What Secure, Enterprise-Grade File Sharing/Syncing Looks Like

As I detailed in my last post, file sharing/syncing is quickly transforming how, where and when we work by making our apps and data available and usable on any Internet-connected device. Even if your organization doesn’t have an enterprise-grade file sharing/syncing capability in place, odds are your employees have attempted to make their lives easier by implementing their own consumer-grade alternatives.

Tim Burke

2014: The Year We Can Help Make BYOD Safe For Your Business

2014: The Year We Can Help Make BYOD Safe For Your Business

As we venture into 2014 expect to hear a lot more about file sharing/syncing. Not surprising given that 25% of information workers now use file sync and share services in their jobs, according to Forrester Research — up from just 5% in 2010.
Anywhere, Anytime, Anyone
And I believe those numbers will continue to climb. Despite sounding mundane, file sharing/syncing (thanks to the cloud and BYOD) has begun to significantly reshape how we work with each other. By making files, documents and application data available and usable on any device, file sharing/syncing empowers employees to work anywhere, anytime, with anyone — using whatever device is at hand.

Lest you decide to discourage such behavior, consider that BYOD provides more than eight hours of additional productivity per week as a BYODer normally works beyond the time-and-place parameters of the traditional office.

Tim Burke

A Glimpse of What’s on the 2014 Tech Horizon …

A Glimpse of What’s on the 2014 Tech Horizon …

As 2013 comes to a close, it’s time to look ahead, and a good place to start is Gartner’s top ten strategic technology trends for 2014 , which point to an accelerating velocity of change that we ignore at our peril:

Tim Burke

How Big is The BYOD File-Sharing Target on Your Corporate Back?

How Big is The BYOD File-Sharing Target on Your Corporate Back?

If yours is like most businesses these days, many of your employees use their own smartphones, tablets and/or laptops to do their jobs — and the numbers are climbing fast as more people go mobile. Pew Research Center reports that as of May 2013, 56% of American adults have a smartphone and as of September 2013, 35% own a tablet.

Tim Burke

Contact Quest Today  ˄
close slider