Posts tagged with "DigitalWorkplace"



Public Security Announcement: Ivanti EPMM Vulnerabilities
Blog | Endpoint Management · 08. August 2023
Two critical vulnerabilities were discovered last week, affecting Ivanti Endpoint Manager Mobile (EPMM), formerly known as MobileIron Core. EPMM is a Mobile Device Management (MDM) and Unified Endpoint Management (UEM) solution offered by Ivanti to help organizations manage and secure mobile devices, such as smartphones and tablets, as well as other endpoints like computers and servers, from a centralized platform.

How to Extend ZTA to Your Mobility Infrastructure
Blog | Endpoint Protection · 27. June 2023
When the government deploys mobile devices to their employees, the military and federal agencies face several challenges due to the nature of their operations and the sensitivity of the information they handle. Military and federal agencies handle sensitive and classified information, requiring strict adherence to compliance regulations and classification guidelines. Deploying mobile devices while maintaining data confidentiality and integrity presents challenges in terms of encryption, access...

Demystifying Technology: The Rise of AI-Powered Chatbots and the Potential Risks to Your Security Posture
Blog | Endpoint Protection · 13. June 2023
Artificial Intelligence (AI) has rapidly gained popularity in recent years, revolutionizing customer service and user interactions. However, the rise of AI-powered technologies also introduces potential risks and challenges to cybersecurity. This article aims to explore those risks and provide insights as to how they can be mitigated, from an enterprise perspective.

Solution Highlight: How ISEC7 Can Help with Your ZTA Deployment
Blog | Endpoint Protection · 30. May 2023
The concept of Zero Trust Architecture (ZTA) promotes a security approach that assumes no implicit trust in any user or device, regardless of its location or network context. Lately, we explained why every organization should have a cybersecurity strategy in place, using a 7-pillars approach to categorize all the different layers, modules, and functionalities that such a strategy can possibly include. Today, we will discuss how ISEC7, your Managed Security Service Provider (MSSP), can help your...

Solution Highlight: Quantum Xchange’s Phio Trusted Xchange (TX)
Blog | Endpoint Protection · 16. May 2023
With the exponential rise of quantum computing in recent years, current encryption algorithms used to secure our data and communications networks are at risk of becoming obsolete. Using the Shor algorithm, the power of a quantum computer will be able to break modern encryption standards sparking the largest cryptographic migration in the history of computing – requiring organizations to replace legacy encryption with quantum-safe cryptography.