Posts tagged with "cybersecurity"



BlackBerry UEM version 12.19: Everything You Need to Know
Blog | Endpoint Protection · 31. October 2023
BlackBerry Unified Endpoint Management (UEM) is a comprehensive mobile device management solution. It enables organizations to securely manage and control mobile devices, applications, and content. UEM offers a single platform for managing a variety of endpoints, including smartphones, tablets, laptops, and other mobile devices, to enhance security and productivity.

Android 14 for Enterprise: Everything You Need to Know
Blog | Endpoint Protection · 31. October 2023
No matter the size or area of business, all organizations must have a proper cybersecurity strategy in place to protect their infrastructure and data from growing cyber-attacks, which include ransomware, data breaches, and malware threats. Preventing phishing attacks is crucial as they exploit human error, compromising sensitive data and causing financial and reputational damage to organizations.

How ISEC7 Addresses Government Endpoint Protection Needs
30. October 2023
Whether your organization's digital workplace and/or mobile enterprise supports federal field operators in high-risk locations, tactical warfighters, CSfC deployments or internal data administration, ISEC7 can support your unique requirements within a government setting. Zero Trust Endpoint Protection As executive orders push the government towards a Zero Trust architecture strategy, ISEC7 can help government agencies deploy a Zero Trust security strategy, incorporate Zero Trust elements into...

New iOS 17 and watchOS 10 Enterprise Features: Everything You Need to Know
Blog | Endpoint Protection · 12. September 2023
At their latest Worldwide Developer Conference (WWDC) this past summer, Apple announced several new features in their soon-to-be-released iOS 17 and watchOS 10, noting an emphasis on communication changes and on-device intelligence. For this blog post, we will focus on the new enterprise features, allowing easier and more advanced management of end-user devices while simultaneously improving the end-user experience and privacy. UEM vendors are currently working on integrating all new enterprise...

Public Security Announcement: Ivanti EPMM Vulnerabilities
Blog | Endpoint Management · 08. August 2023
Two critical vulnerabilities were discovered last week, affecting Ivanti Endpoint Manager Mobile (EPMM), formerly known as MobileIron Core. EPMM is a Mobile Device Management (MDM) and Unified Endpoint Management (UEM) solution offered by Ivanti to help organizations manage and secure mobile devices, such as smartphones and tablets, as well as other endpoints like computers and servers, from a centralized platform.

Demystifying Cybersecurity: Goodbye Passwords, Hello Passkeys?
Blog | Endpoint Protection · 10. July 2023
Passwords have been used for decades to protect all types of information, but there are many challenges associated with them. Password fatigue, the feeling from employees of being frustrated by the numerous passwords one needs to remember for different accounts, poses a challenge for enterprises as it can lead to users resorting to weak or reused passwords, compromising security, and increasing the risk of unauthorized access and potential data breaches. Securely managing many user passwords...

Demystifying Cybersecurity: Zero Trust Architecture in a Nutshell
Blog | Endpoint Protection · 08. May 2023
Nowadays most employees are provided with the ability to work remotely and access their work data and services from virtually any location, on any device, and at any time. While this may be an improvement in terms of offering employees more of a work-life balance, employees still have one *little* thing to worry about: SECURITY. Easier access to more services from more devices and locations translates into an exponentially increased surface of attack, so a comprehensive security strategy must...

How ISEC7 Addresses Government Endpoint Protection Needs
Blog | Endpoint Protection · 18. April 2023
Whether your organization's digital workplace and/or mobile enterprise supports federal field operators in high-risk locations, tactical warfighters, CSfC deployments or internal data administration, ISEC7 can support your unique requirements within a government setting. Zero Trust Endpoint Protection As executive orders push the government towards a Zero Trust architecture strategy, ISEC7 can help government agencies deploy a Zero Trust security strategy, incorporate Zero Trust elements into...

Quantum Computing | Time to Get Post-Quantum Ready
Blog | Endpoint Protection · 04. April 2023
In our last blog, we talked about the current challenges with cryptography that urgently need to be addressed, considering the exponential rise of quantum computing and the risk posed to the security of our communications. Today, we will review the existing technological approaches from the industry to solve these challenges and ensure our communications will remain secure for years to come from both traditional and quantum computer cyberattacks.

Quantum Computing | Time to Get Post-Quantum Ready
Blog | Endpoint Protection · 21. March 2023
As we discussed in a recent blog post, quantum computing, like any major technological advance, will bring a lot of good things, but it also poses a serious risk to the security of our communications, making them vulnerable to new quantum-powered attacks performed by state-sponsored cybercriminals. While most technologies used to secure our data were believed to be secure and “unbreakable” some years ago, they will certainly not be in the years to come. Quantum computing is accelerating...

Show more