Posts tagged with "Cybersecurity"



12. May 2021
What is Workspace ONE Intelligent Hub?
This blog is going to deep dive into Workspace ONE Intelligent Hub. There are many questions about what Intelligent Hub is, what it can do, and how to use it. Here is an overview that clears up all of these questions.
06. May 2021
Mobile Threat Defense
It's World Password Day today, an annual celebration of the longest-lived cybersecurity control in computing history. Since the dawn of bits and bytes, passwords have been the pivotal first line of defense for the security of systems and networks.
05. May 2021
Controlling your users as a Guests in other tenants on external meetings
Microsoft Data Loss Prevention is rich in features and has a very wide adoption. In this article two coverage limitations will be addressed: First when a user is a Guest in an external tenant, and second, when an user joins a meeting hosted by external user.
04. May 2021
Better data security in the post-pandemic world
2020, meant it was one the busiest year on record for security teams as they fought off bad actors and adapted to new employee behaviours When the pandemic began, organisations believed remote working would be temporary, but as two weeks became six, and six weeks became six months and most of us remained at home. As we begin 2021, it has become too clear to many businesses that remote work is here to stay. In fact, Research from Ivanti/former MobileIron found that 80% of the global workforce...
30. April 2021
MIL-STD-810 smartphones: Defense grade durability built for business
In industries like manufacturing, construction and logistics, there’s a long-standing perception that consumer smartphones aren’t tough enough for frontline use. But that’s now changing with the advent of ruggedized smartphones that comply with MIL-STD-810, the Department of Defense’s gold standard for mobile survivability and endurance.
29. April 2021
Securing the Public Sector
Hank Schless, Senior Manager, Security Solutions at Lookout recently had the pleasure of having Kiersten Todt, Managing Director of the Cybersecurity Readiness Institute, on the Endpoint Enigma podcast. After Lookout released its U.S. Government Threat Report, Hank wanted to dive into some of the key findings, such as outdated operating systems. Kiersten, who also served as the executive director of the President's Commission on Enhancing National Cybersecurity, was the perfect guest to have on...
28. April 2021
VMware Points Carbon Black Security to Containers, Kubernetes
VMware is expanding its Carbon Black Cloud Workload security offering to include containers and Kubernetes, from development through production.
26. April 2021
Security Classification
Classifying information based on its sensitivity may seem like a relatively minor part of IT security. Especially when compared to the proliferation of highly-complex network security solutions that focus on blocking internal and external threats.
23. April 2021
Manage Any Critical Event with BlackBerry Alert
Every day, organizations are impacted by critical events, including operational interruptions, network outages, cyber attacks, natural disasters, or other emergencies. According to a recent 2021 report from BCI, in 2020 nearly 50% of businesses faced IT or telecom incidents that triggered their emergency communications plans, while over 45% dealt with adverse weather or natural disasters.
21. April 2021
mobile security challenges
Mobile devices make irresistible targets for threat actors because they’re both ubiquitous and vulnerable. In 2020, there were an estimated 3.5B smartphone users. This year, another 300 million are projected to join their ranks. For the first time, more than half of all devices connected to the Internet are mobile. Many of these devices will be used by remote workers to access their employers’ enterprise networks, cloud applications, and data. By 2024, mobile workers are projected to...

Show more