article thumbnail

1,859 Android and iOS apps were containing hard-coded Amazon AWS credentials

Security Affairs

In some cases, the presence of the access keys has no specific reason, in other cases, they are part of testing and never removed code. The problem is that the SDK included cloud infrastructure keys embedded used to access the translation service.

Cloud 91
article thumbnail

In the fragmented insurance landscape, let’s unify customer experience

Thales Cloud Protection & Licensing

So, in this world of diverse policies, how do you synthesize your brand and product portfolio across your B2B and B2C channels into secure individual streamlined experiences? case study here. Some insurance companies have gone so far as to insure an identifying part of a celebrity’s body. You can read more about the a.s.r.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Austin Signal: The Program

John Battelle's Searchblog

Signal will be focused mostly on case studies, so after an Ignite we'll hear from the CEO of Loopt, with a case study around the company's work with Virgin America. After another Ignite, we'll hear a case study from Levi's, and a unique POV on B2B from Spiceworks. Stuff happens.

article thumbnail

What Is a SaaS Security Checklist? Tips & Free Template

eSecurity Planet

These checklists include security standards and best practices for SaaS and cloud applications, and B2B SaaS providers use them to guarantee that their solutions match customer security standards. Can the vendor give references or case studies that show effective security deployments in similar organizations?