10. June 2021
Remote Work
For many organizations, 2020 was the year that finally saw remote work become a reality on a global scale. As many people begin transitioning back to the office, many organizations are thinking about how they can transition from a remote workforce to a more permanent hybrid workplace. We recently conducted a study with over 900 chief information security officers (CISOs) on the state of Zero Trust and found that 81 percent say their organization has started or currently has a hybrid work...
09. June 2021
 fastly-Probleme bremsen zahlreiche Websites aus
Zahlreiche Internetseiten waren gestern, am Dienstag, .8.06.2021 nicht erreichbar gewesen – dazu zählen Amazon, Reddit, Adobe und weitere. Grund war der Ausfall eines Clouddienstes.
08. June 2021
Phone with eSIM Technology
It seems every day we discover more and more services and activities that can be done virtually, showing that the world at large has indeed “gone virtual.” The servers that you, your apps, your smart TV, and IoT devices all connect with more than likely also connect with a virtual server that is hosted in datacenter or a cloud datacenter. This virtual renaissance also applies to the well-known SIM (subscriber identification module) card; embedded-SIMs, or eSIMs, are virtual SIM cards that...
31. May 2021
AGAT SphereShield Protected Customers from Chinese Hafnium Microsoft Exchange Hack
In January 2021 an unusually aggressive Chinese cyber espionage unit began utilizing four zero-day exploits to hack into tens of thousands of Microsoft Exchange servers worldwide.
28. May 2021
BlackBerry SecuSUITE and Samsung Knox: Partnering for Classified Communications
Your smartphone is a universal communication tool and a platform that helps drive collaboration around sensitive topics, from the personal, all the way up to top-tier communication such as corporate conversations around financial and intellectual property data, and even military secrets. As a result, smartphones are an appealing target for nation-state intelligence agencies and others intent on malicious exploits.
26. May 2021
Post Ransomware Recovery - What Do I Do Now?
Ransomware is an ever-evolving form of malware designed to encrypt files on a device, rendering any files and the systems that rely on them unusable. Malicious actors then demand ransom in exchange for decryption.
20. May 2021
ISEC7 Group - Android Enterprise Device Reseller
ISEC7 received the official Android Enterprise Device Reseller status.
19. May 2021
Defend yourself against the most advanced threats with VMWare Carbon Black
For the third year in a row, VMware Carbon Black announced its participation in MITRE Engenuity’s third annual ATT&CK® Evaluations with VMware Carbon Black Cloud.
18. May 2021
Phishing attacks in the financial sector
As guardians of valuable monetary assets and highly sensitive data, financial institutions are the perfect target for cybercriminals. According to IBM, the financial services sector was the number one target of cyberattacks in 2020 among all industries. This means these organizations continue to be challenged and invest heavily in both people and technology to make sure they can withstand attacks of any type.
12. May 2021
What is Workspace ONE Intelligent Hub?
This blog is going to deep dive into Workspace ONE Intelligent Hub. There are many questions about what Intelligent Hub is, what it can do, and how to use it. Here is an overview that clears up all of these questions.

Show more